CVE-2017-9022Improper Input Validation in Strongswan

Severity
7.5HIGHNVD
EPSS
1.0%
top 22.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 8
Latest updateMay 14

Description

The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

debiandebian/strongswan< strongswan 5.5.1-4 (bookworm)
Debianstrongswan/strongswan< 5.5.1-4+3
Ubuntustrongswan/strongswan< 5.1.2-0ubuntu2.6+1

Also affects: Debian Linux 8.0, 9.0, Ubuntu Linux 14.04, 16.04, 16.10, 17.04

🔴Vulnerability Details

3
GHSA
GHSA-229r-rxf9-m7pj: The gmp plugin in strongSwan before 52022-05-14
OSV
CVE-2017-9022: The gmp plugin in strongSwan before 52017-06-08
OSV
strongswan vulnerabilities2017-05-30

📋Vendor Advisories

3
Red Hat
strongswan: Insufficient validation of RSA public keys passed to the gmp plugin2017-05-30
Ubuntu
strongSwan vulnerabilities2017-05-30
Debian
CVE-2017-9022: strongswan - The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public ...2017

🕵️Threat Intelligence

1
Recorded Future
The Race Between Security Professionals and Adversaries

💬Community

3
Bugzilla
CVE-2017-9022 CVE-2017-9023 strongswan: various flaws [epel-all]2017-05-31
Bugzilla
CVE-2017-9022 strongswan: Insufficient validation of RSA public keys passed to the gmp plugin2017-05-31
Bugzilla
CVE-2017-9022 CVE-2017-9023 strongswan: various flaws [fedora-all]2017-05-31