The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.
2010-08-20T18:00:02.187
2025-04-11T00:51:21.963
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | strongswan | strongswan | 4.3.0 | Yes |
Application | strongswan | strongswan | 4.3.1 | Yes |
Application | strongswan | strongswan | 4.3.2 | Yes |
Application | strongswan | strongswan | 4.3.3 | Yes |
Application | strongswan | strongswan | 4.3.4 | Yes |
Application | strongswan | strongswan | 4.3.5 | Yes |
Application | strongswan | strongswan | 4.3.6 | Yes |
Application | strongswan | strongswan | 4.4.0 | Yes |