strongSwan before 5.9.8 allows remote attackers to cause a denial of service in the revocation plugin by sending a crafted end-entity (and intermediate CA) certificate that contains a CRL/OCSP URL that points to a server (under the attacker’s control) that doesn’t properly respond but (for example) just does nothing after the initial TCP handshake, or sends an excessive amount of application data.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Alpine | edge-main | noarch | strongswan | < 5.9.8-r0 | UNKNOWN |
Alpine | 3.13-main | noarch | strongswan | < 5.9.1-r2 | UNKNOWN |
Alpine | 3.14-main | noarch | strongswan | < 5.9.1-r3 | UNKNOWN |
Alpine | 3.15-main | noarch | strongswan | < 5.9.1-r4 | UNKNOWN |
Alpine | 3.16-main | noarch | strongswan | < 5.9.5-r2 | UNKNOWN |
Alpine | 3.17-main | noarch | strongswan | < 5.9.8-r0 | UNKNOWN |
Alpine | 3.18-main | noarch | strongswan | < 5.9.8-r0 | UNKNOWN |
Alpine | 3.19-main | noarch | strongswan | < 5.9.8-r0 | UNKNOWN |