CVE-2017-9023Infinite Loop in Strongswan

CWE-835Infinite Loop10 documents7 sources
Severity
7.5HIGHNVD
EPSS
1.0%
top 23.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 8
Latest updateMay 13

Description

The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

debiandebian/strongswan< strongswan 5.5.1-4 (bookworm)
Debianstrongswan/strongswan< 5.5.1-4+3
Ubuntustrongswan/strongswan< 5.1.2-0ubuntu2.6+1

🔴Vulnerability Details

3
GHSA
GHSA-3vpr-mhgf-fgjv: The ASN2022-05-13
OSV
CVE-2017-9023: The ASN2017-06-08
OSV
strongswan vulnerabilities2017-05-30

📋Vendor Advisories

3
Red Hat
strongswan: Incorrect Handling of CHOICE types in ASN.1 parser and x509 plugin2017-05-30
Ubuntu
strongSwan vulnerabilities2017-05-30
Debian
CVE-2017-9023: strongswan - The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when...2017

💬Community

3
Bugzilla
CVE-2017-9022 CVE-2017-9023 strongswan: various flaws [epel-all]2017-05-31
Bugzilla
CVE-2017-9022 CVE-2017-9023 strongswan: various flaws [fedora-all]2017-05-31
Bugzilla
CVE-2017-9023 strongswan: Incorrect Handling of CHOICE types in ASN.1 parser and x509 plugin2017-05-31