Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 2 Jun 2009 13:54:55 +0200
From: Thomas Biege <>
To: OSS-Security Mailinglist <>
Subject: CVE request: two denial of service bugs in strongswan

Maybe this two bugs need a CVE-ID...

Date: Wed, 27 May 2009 14:00:37 +0200
From: Andreas Steffen <>
Organization: Linux strongSwan
To: strongSwan Announce <>,
    strongSwan Users <>
Subject: [Announce] ANNOUNCE:  strongSwan 4.3.1 and 4.2.15 released


Orange Labs IKEv2 fuzzer discovers two DoS vulnerabilities

Two DoS vulnerabilities in the charon daemon were discovered by
fuzzing techniques:

1) Receiving a malformed IKE_SA_INIT request leaves an incomplete state
   which causes a crash of the IKEv2 charon daemon while dereferencing
   a null pointer if a subsequent CREATE_CHILD_SA request for the
   same connection is received.

2) Receiving an IKE_AUTH request with either a missing TSi or TSr
   traffic selector payload causes a crash of the IKEv2 charon daemon
   because the null pointer checks for TSi and TSr prior to deletion
   were swapped by mistake.

The IKEv2 fuzzer used was developed by the Orange Labs vulnerability
research team. The tool was initially written by Gabriel Campana and
is now maintained by Laurent Butti.

All strongSwan versions from 4.1.0 up to 4.3.0 are affected. Either
apply the two security patches

or upgrade to strongSwan 4.3.1 or 4.2.15.

 Thomas Biege <>, SUSE LINUX, Security Support & Auditing
 SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)
           Hamming's Motto:
           The purpose of computing is insight, not numbers.
                                -- Richard W. Hamming

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.