The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185.
download.strongswan.org/patches/07_asn1_length_patch/strongswan-4.3.x_asn1_length.patch
download.strongswan.org/patches/07_asn1_length_patch/strongswan-4.x.x_asn1_length.patch
lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html
lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html
secunia.com/advisories/36922
up2date.astaro.com/2009/08/up2date_7505_released.html
www.debian.org/security/2009/dsa-1899
www.openwall.com/lists/oss-security/2009/07/27/1
www.vupen.com/english/advisories/2009/2247
lists.strongswan.org/pipermail/announce/2009-July/000056.html