Логотип exploitDog
bind: "CVE-2023-26463"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-26463"

Количество 7

Количество 7

ubuntu логотип

CVE-2023-26463

около 2 лет назад

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.

CVSS3: 9.8
EPSS: Средний
nvd логотип

CVE-2023-26463

около 2 лет назад

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.

CVSS3: 9.8
EPSS: Средний
msrc логотип

CVE-2023-26463

около 2 лет назад

CVSS3: 9.8
EPSS: Средний
debian логотип

CVE-2023-26463

около 2 лет назад

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution be ...

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-vcx9-7pcc-q8c7

около 2 лет назад

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2023-02129

больше 2 лет назад

Уязвимость демона strongSwan, связанная с ошибками при проверке сертификата в методах EAP на основе TLS, позволяющая нарушителю выполнить отказ в обслуживании

CVSS3: 7.5
EPSS: Средний
redos логотип

ROS-20240617-01

около 1 года назад

Уязвимость strongswan

CVSS3: 7.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-26463

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.

CVSS3: 9.8
17%
Средний
около 2 лет назад
nvd логотип
CVE-2023-26463

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.

CVSS3: 9.8
17%
Средний
около 2 лет назад
msrc логотип
CVSS3: 9.8
17%
Средний
около 2 лет назад
debian логотип
CVE-2023-26463

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution be ...

CVSS3: 9.8
17%
Средний
около 2 лет назад
github логотип
GHSA-vcx9-7pcc-q8c7

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.

CVSS3: 9.8
17%
Средний
около 2 лет назад
fstec логотип
BDU:2023-02129

Уязвимость демона strongSwan, связанная с ошибками при проверке сертификата в методах EAP на основе TLS, позволяющая нарушителю выполнить отказ в обслуживании

CVSS3: 7.5
17%
Средний
больше 2 лет назад
redos логотип
ROS-20240617-01

Уязвимость strongswan

CVSS3: 7.5
17%
Средний
около 1 года назад

Уязвимостей на страницу