Improper input validation in strongswan (Alpine package)



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-9023
CWE-ID CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
strongswan (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Improper input validation

EUVDB-ID: #VU6874

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2017-9023

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

ASN.1 CHOICE types are not correctly handled by the ASN.1 parser in strongSwan when parsing X.509 certificates with extensions that use such types. This could lead to infinite looping of the thread parsing a specifically crafted certificate.

Mitigation

Install update from vendor's website.

Vulnerable software versions

strongswan (Alpine package): 5.3.5-r1

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=b5b340734c9f745798a1e735a1b11710ef301237
https://git.alpinelinux.org/aports/commit/?id=b2909ae5d93989f6f7aa2506a963bb8061269792
https://git.alpinelinux.org/aports/commit/?id=f48354faeaa48613ec150ba912a378e92d8fd969
https://git.alpinelinux.org/aports/commit/?id=ed2876361e4be4201d60d14712478e77f83a87e6
https://git.alpinelinux.org/aports/commit/?id=c230c56fced0fa200359730435bbce4792cd3e11
https://git.alpinelinux.org/aports/commit/?id=7fc2f4d05809912063bfe8a962dc13d5ddedede5
https://git.alpinelinux.org/aports/commit/?id=ac75b4cf5fdcc373908bd64393d0be391b2edb34
https://git.alpinelinux.org/aports/commit/?id=73c141f3470739c757e59dc00b5a6c58861f9365
https://git.alpinelinux.org/aports/commit/?id=9a6a7cfb656f54db0871293e52cee189cab41be3
https://git.alpinelinux.org/aports/commit/?id=b9f9484b5a7eb04f6f3f67df3e650e9b4433e99b
https://git.alpinelinux.org/aports/commit/?id=82ccbbfff5cbbf01b74519ddd9bc16c487b449e6
https://git.alpinelinux.org/aports/commit/?id=f647e2d3d31f6c5e3c4f4f41bfbee7eea8d02271


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###