The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2009-08-04T16:13:00
Updated: 2009-08-15T09:00:00
Reserved: 2009-08-04T00:00:00
Link: CVE-2009-2661
JSON object: View
NVD Information
Status : Modified
Published: 2009-08-04T16:30:00.483
Modified: 2009-11-24T07:02:12.127
Link: CVE-2009-2661
JSON object: View
Redhat Information
No data.
CWE