6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
0.006 Low
EPSS
Percentile
77.6%
strongSwan VPN’s charon server prior to version 5.6.3 does not check packet length and may allow buffer underflow, resulting in denial of service.
CWE-124: Buffer Underwrite (‘Buffer Underflow’) - CVE-2018-5388
In stroke_socket.c
, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
According to the vendor, an attacker must typically have local root permissions to access the socket. However, other accounts and groups such as the vpn
group (if capability dropping in enabled, for example) may also have sufficient permissions, but this configuration does not appear to be the default behavior.
A remote attacker with local user credentials (possibly a normal user in the vpn group, or root) may be able to underflow the buffer and cause a denial of service.
Apply an update
StrongSwan version 5.6.3 and above contain a patch for this issue.
338343
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: May 23, 2018 Updated: May 24, 2018
Statement Date: May 24, 2018
Affected
We have not received a statement from the vendor.
An updated version of strongSwan is expected to become available shortly. Further details can be read in the advisory.
Notified: March 21, 2018 Updated: May 24, 2018
Affected
We have not received a statement from the vendor.
StrongSwan version 5.6.3 and above contain a patch for this issue.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
Notified: May 23, 2018 Updated: May 23, 2018
Unknown
We have not received a statement from the vendor.
View all 22 vendors __View less vendors __
Group | Score | Vector |
---|---|---|
Base | 4.9 | AV:N/AC:H/Au:S/C:N/I:N/A:C |
Temporal | 3.8 | E:POC/RL:OF/RC:C |
Environmental | 3.9 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
Thanks to Kevin Backhouse of Semmle Ltd. for reporting this vulnerability.
This document was written by Garret Wassermann.
CVE IDs: | CVE-2018-5388 |
---|---|
Date Public: | 2018-05-22 Date First Published: |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
0.006 Low
EPSS
Percentile
77.6%