Логотип exploitDog
bind:"BDU:2023-02129" OR bind:"CVE-2023-26463"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-02129" OR bind:"CVE-2023-26463"

Количество 7

Количество 7

fstec логотип

BDU:2023-02129

почти 3 года назад

Уязвимость демона strongSwan, связанная с ошибками при проверке сертификата в методах EAP на основе TLS, позволяющая нарушителю выполнить отказ в обслуживании

CVSS3: 7.5
EPSS: Средний
redos логотип

ROS-20240617-01

больше 1 года назад

Уязвимость strongswan

CVSS3: 7.5
EPSS: Средний
ubuntu логотип

CVE-2023-26463

почти 3 года назад

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.

CVSS3: 9.8
EPSS: Средний
nvd логотип

CVE-2023-26463

почти 3 года назад

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.

CVSS3: 9.8
EPSS: Средний
msrc логотип

CVE-2023-26463

больше 2 лет назад

CVSS3: 9.8
EPSS: Средний
debian логотип

CVE-2023-26463

почти 3 года назад

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution be ...

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-vcx9-7pcc-q8c7

почти 3 года назад

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-02129

Уязвимость демона strongSwan, связанная с ошибками при проверке сертификата в методах EAP на основе TLS, позволяющая нарушителю выполнить отказ в обслуживании

CVSS3: 7.5
12%
Средний
почти 3 года назад
redos логотип
ROS-20240617-01

Уязвимость strongswan

CVSS3: 7.5
12%
Средний
больше 1 года назад
ubuntu логотип
CVE-2023-26463

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.

CVSS3: 9.8
12%
Средний
почти 3 года назад
nvd логотип
CVE-2023-26463

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.

CVSS3: 9.8
12%
Средний
почти 3 года назад
msrc логотип
CVSS3: 9.8
12%
Средний
больше 2 лет назад
debian логотип
CVE-2023-26463

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution be ...

CVSS3: 9.8
12%
Средний
почти 3 года назад
github логотип
GHSA-vcx9-7pcc-q8c7

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.

CVSS3: 9.8
12%
Средний
почти 3 года назад

Уязвимостей на страницу