7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.005 Low
EPSS
Percentile
76.0%
Package : strongswan
Version : 4.5.2-1.5+deb7u9
CVE ID : CVE-2017-9022 CVE-2017-9023
Two denial of service vulnerabilities were identified in strongSwan, an
IKE/IPsec suite, using Google's OSS-Fuzz fuzzing project.
CVE-2017-9022
RSA public keys passed to the gmp plugin aren't validated sufficiently
before attempting signature verification, so that invalid input might
lead to a floating point exception and crash of the process.
A certificate with an appropriately prepared public key sent by a peer
could be used for a denial-of-service attack.
CVE-2017-9023
ASN.1 CHOICE types are not correctly handled by the ASN.1 parser when
parsing X.509 certificates with extensions that use such types. This could
lead to infinite looping of the thread parsing a specifically crafted
certificate.
For Debian 7 "Wheezy", these problems have been fixed in version
4.5.2-1.5+deb7u9.
We recommend that you upgrade your strongswan packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | ppc64el | libstrongswan-standard-plugins | < 5.2.1-6+deb8u3 | libstrongswan-standard-plugins_5.2.1-6+deb8u3_ppc64el.deb |
Debian | 7 | armhf | strongswan-ikev1 | < 4.5.2-1.5+deb7u9 | strongswan-ikev1_4.5.2-1.5+deb7u9_armhf.deb |
Debian | 7 | armel | strongswan-ikev1 | < 4.5.2-1.5+deb7u9 | strongswan-ikev1_4.5.2-1.5+deb7u9_armel.deb |
Debian | 8 | i386 | libstrongswan-standard-plugins | < 5.2.1-6+deb8u3 | libstrongswan-standard-plugins_5.2.1-6+deb8u3_i386.deb |
Debian | 7 | amd64 | strongswan-starter | < 4.5.2-1.5+deb7u9 | strongswan-starter_4.5.2-1.5+deb7u9_amd64.deb |
Debian | 8 | ppc64el | libstrongswan | < 5.2.1-6+deb8u3 | libstrongswan_5.2.1-6+deb8u3_ppc64el.deb |
Debian | 7 | armel | strongswan-ikev2 | < 4.5.2-1.5+deb7u9 | strongswan-ikev2_4.5.2-1.5+deb7u9_armel.deb |
Debian | 8 | s390x | libstrongswan-standard-plugins | < 5.2.1-6+deb8u3 | libstrongswan-standard-plugins_5.2.1-6+deb8u3_s390x.deb |
Debian | 8 | all | strongswan-ikev2 | < 5.2.1-6+deb8u3 | strongswan-ikev2_5.2.1-6+deb8u3_all.deb |
Debian | 8 | mips | strongswan-starter | < 5.2.1-6+deb8u3 | strongswan-starter_5.2.1-6+deb8u3_mips.deb |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.005 Low
EPSS
Percentile
76.0%