CVE-2010-2628Code Injection in Strongswan

CWE-94Code Injection5 documents5 sources
Severity
7.5HIGHNVD
EPSS
5.7%
top 9.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 20
Latest updateMay 17

Description

The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages3 packages

debiandebian/strongswan< strongswan 4.4.1-1 (bookworm)
Debianstrongswan/strongswan< 4.4.1-1+3
NVDstrongswan/strongswan8 versions+7

Patches

🔴Vulnerability Details

2
GHSA
GHSA-5ccj-qrf4-3667: The IKE daemon in strongSwan 42022-05-17
OSV
CVE-2010-2628: The IKE daemon in strongSwan 42010-08-20

💥Exploits & PoCs

1
Exploit-DB
Opera 10/11 - Bad Nesting with Frameset Tag Memory Corruption (Metasploit)2011-10-06

📋Vendor Advisories

1
Debian
CVE-2010-2628: strongswan - The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not ...2010