Severity
6.5MEDIUMNVD
OSV8.1OSV7.5
EPSS
4.3%
top 11.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 31
Latest updateMay 13

Description

In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages5 packages

debiandebian/strongswan< strongswan 5.6.3-1 (bookworm)
CVEListV5strongswan/strongswan5.6.35.6.3
Debianstrongswan/strongswan< 5.6.3-1+3
Ubuntustrongswan/strongswan< 5.1.2-0ubuntu2.10+2

Also affects: Debian Linux 8.0, 9.0, Ubuntu Linux 14.04, 16.04, 18.04

🔴Vulnerability Details

4
GHSA
GHSA-fg62-299p-x79j: In stroke_socket2022-05-13
OSV
tomcat7 vulnerabilities2021-03-15
OSV
strongswan vulnerabilities2018-09-25
OSV
CVE-2018-5388: In stroke_socket2018-05-31

📋Vendor Advisories

3
Ubuntu
strongSwan vulnerabilities2018-09-25
Red Hat
strongswan: integer underflow leads to buffer overflow and denial of service in stroke_socket.c2018-05-22
Debian
CVE-2018-5388: strongswan - In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check cou...2018

💬Community

3
Bugzilla
CVE-2018-5388 strongswan: integer underflow leads to buffer overflow and denial of service in stroke_socket.c2018-05-23
Bugzilla
CVE-2018-5388 strongswan: integer underflow leads to buffer overflow and denial of service in stroke_socket.c [epel-all]2018-05-23
Bugzilla
CVE-2018-5388 strongswan: buffer underflow in stroke_socket.c [fedora-all]2018-05-23