Lucene search

K
archlinuxArchLinuxASA-201802-10
HistoryFeb 21, 2018 - 12:00 a.m.

[ASA-201802-10] strongswan: denial of service

2018-02-2100:00:00
security.archlinux.org
9

0.004 Low

EPSS

Percentile

73.9%

Arch Linux Security Advisory ASA-201802-10

Severity: Medium
Date : 2018-02-21
CVE-ID : CVE-2018-6459
Package : strongswan
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-625

Summary

The package strongswan before version 5.6.2-1 is vulnerable to denial
of service.

Resolution

Upgrade to 5.6.2-1.

pacman -Syu “strongswan>=5.6.2-1”

The problem has been fixed upstream in version 5.6.2.

Workaround

None.

Description

The rsa_pss_params_parse function in
libstrongswan/credentials/keys/signature_params.c before strongSwan
5.6.2 allows remote attackers to cause a denial of service via a
crafted RSASSA-PSS signature that lacks a mask generation function
parameter.

Impact

A remote attacker is able to crash the application by providing a
maliciously-crafted signature.

References

https://bugs.archlinux.org/task/57597
https://www.strongswan.org/blog/2018/02/19/strongswan-vulnerability-(cve-2018-6459).html
https://download.strongswan.org/security/CVE-2018-6459/strongswan-5.6.1_pss_mgf1_alg.patch
https://github.com/strongswan/strongswan/commit/40da179f28b768ffcf6ff7e2f68675eb44806668
https://security.archlinux.org/CVE-2018-6459

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanystrongswan< 5.6.2-1UNKNOWN