cve-2009-2185
Vulnerability from cvelistv5
Published
2009-06-24 23:00
Modified
2024-08-07 05:44
Severity ?
EPSS score ?
Summary
The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:44:55.585Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2009-1639", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1639" }, { "name": "35740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35740" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ingate.com/Relnote.php?ver=481" }, { "name": "1022428", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022428" }, { "name": "RHSA-2009:1138", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1138.html" }, { "name": "ADV-2009-1706", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1706" }, { "name": "oval:org.mitre.oval:def:11079", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079" }, { "name": "36950", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36950" }, { "name": "35522", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35522" }, { "name": "36922", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36922" }, { "name": "37504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37504" }, { "name": "DSA-1899", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1899" }, { "name": "35452", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35452" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.strongswan.org/CHANGES42.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.strongswan.org/CHANGES2.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://up2date.astaro.com/2009/07/up2date_7404_released.html" }, { "name": "DSA-1898", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1898" }, { "name": "ADV-2009-1829", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1829" }, { "name": "FEDORA-2009-7478", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html" }, { "name": "35698", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35698" }, { "name": "ADV-2009-3354", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3354" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.strongswan.org/CHANGES4.txt" }, { "name": "FEDORA-2009-7423", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html" }, { "name": "35804", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35804" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-06-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2009-1639", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1639" }, { "name": "35740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35740" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ingate.com/Relnote.php?ver=481" }, { "name": "1022428", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022428" }, { "name": "RHSA-2009:1138", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1138.html" }, { "name": "ADV-2009-1706", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1706" }, { "name": "oval:org.mitre.oval:def:11079", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079" }, { "name": "36950", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36950" }, { "name": "35522", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35522" }, { "name": "36922", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36922" }, { "name": "37504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37504" }, { "name": "DSA-1899", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1899" }, { "name": "35452", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35452" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.strongswan.org/CHANGES42.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.strongswan.org/CHANGES2.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://up2date.astaro.com/2009/07/up2date_7404_released.html" }, { "name": "DSA-1898", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1898" }, { "name": "ADV-2009-1829", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1829" }, { "name": "FEDORA-2009-7478", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html" }, { "name": "35698", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35698" }, { "name": "ADV-2009-3354", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3354" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.strongswan.org/CHANGES4.txt" }, { "name": "FEDORA-2009-7423", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html" }, { "name": "35804", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35804" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2185", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2009-1639", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1639" }, { "name": "35740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35740" }, { "name": "http://www.ingate.com/Relnote.php?ver=481", "refsource": "CONFIRM", "url": "http://www.ingate.com/Relnote.php?ver=481" }, { "name": "1022428", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022428" }, { "name": "RHSA-2009:1138", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1138.html" }, { "name": "ADV-2009-1706", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1706" }, { "name": "oval:org.mitre.oval:def:11079", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079" }, { "name": "36950", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36950" }, { "name": "35522", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35522" }, { "name": "36922", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36922" }, { "name": "37504", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37504" }, { "name": "DSA-1899", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1899" }, { "name": "35452", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35452" }, { "name": "http://download.strongswan.org/CHANGES42.txt", "refsource": "CONFIRM", "url": "http://download.strongswan.org/CHANGES42.txt" }, { "name": "http://download.strongswan.org/CHANGES2.txt", "refsource": "CONFIRM", "url": "http://download.strongswan.org/CHANGES2.txt" }, { "name": "http://up2date.astaro.com/2009/07/up2date_7404_released.html", "refsource": "CONFIRM", "url": "http://up2date.astaro.com/2009/07/up2date_7404_released.html" }, { "name": "DSA-1898", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1898" }, { "name": "ADV-2009-1829", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1829" }, { "name": "FEDORA-2009-7478", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html" }, { "name": "35698", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35698" }, { "name": "ADV-2009-3354", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3354" }, { "name": "http://download.strongswan.org/CHANGES4.txt", "refsource": "CONFIRM", "url": "http://download.strongswan.org/CHANGES4.txt" }, { "name": "FEDORA-2009-7423", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html" }, { "name": "35804", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35804" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2185", "datePublished": "2009-06-24T23:00:00", "dateReserved": "2009-06-24T00:00:00", "dateUpdated": "2024-08-07T05:44:55.585Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:2.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5518A917-D5D1-4985-BF71-B1A34BD3D5B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:2.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"778D7442-F54A-47DF-B87B-3CFA3CF08799\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:2.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A4B1F28-B3B8-4E31-8E4E-25F5A29F3AB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:2.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16984E6E-7CA8-4DC3-B800-FFE007617FE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:2.8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C85F0BE-7E89-4B79-A036-9238785BE705\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:2.8.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DFF4780-2F92-4DF3-878A-C7E2BD57E39C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:2.8.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C794994-9367-4BBB-8940-BBB44B7C1C5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:2.8.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"082272D3-0FE4-4959-978A-FFF795B52CA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:2.8.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DFEF9B3-C7F7-4588-A174-FAFD39C04116\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:2.8.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02A38BCE-66F9-49F9-8C48-DB3DA9E7054D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:2.8.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E18EB62-1042-4F26-9EC3-B7EEA2182716\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C89C6007-3A8D-427D-8BE3-047DD52DE196\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97027262-849C-4DE9-90C9-0D9FBBC9F96B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8658539D-27D8-47EE-9468-A6B625E6D45F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89ACA351-D10F-4D1A-95B0-4B2E329F1E1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A4D6E89-5313-4016-8A7E-036579330DB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95A8E226-FCEC-4545-A628-24F5A8103BCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B944D80-A8B9-4034-A95B-BA92ADC8D4E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5267BCC-A51C-4F3B-840C-49EF9C2A15F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CDCDB4B-2DF5-4394-B33A-08A4B6604D92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66206A52-373C-4DBB-A3D7-2A7569C0181E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F654D3C4-D3A3-41E1-A0D8-3A384319AE08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C41F9E10-000D-4F3B-BEA6-DEE87405B89B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F37DFE8-2996-4904-B733-7BAECA95CB48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38209DC9-3BE6-49EF-8BA1-6E2BC5D24FEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"155EB8F5-7C3C-4293-91EE-62DA561DA54A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E42B67A3-8650-426F-A8E8-DCA4180D787A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.2.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21CDA326-C5E4-4BAF-9DC6-4E5A57304C1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"384C0CAE-8AC3-47AA-9F1C-9DE6779CA583\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:strongswan:strongswan:4.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00BC4DA6-BFD1-43CF-B8B8-DACBF09E4721\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7841F42-1226-43C4-A007-88847925D872\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77930F86-13FF-4787-A39F-2D00110AFBFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B1ADD64-2503-4EED-9F6F-E425A3406123\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3067BE9-4314-42BD-8131-89C4899F7D47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E00CA6E5-1F63-4D59-BA72-0F8697671718\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C35A2049-8502-41F2-894E-E39AEBEB6816\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD82E956-8C8E-4B38-9E82-4AA9AEFE6891\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D0F0EA4-A0DF-48CC-9B42-465A36945503\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78325087-599F-448B-8C47-570914FF6C59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"059CFA5C-B262-47AF-94A6-8E74AFB19204\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12F25627-235B-4312-80A4-4E36DE0E72A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3E70B88-6348-42BB-AE96-46BDB1F3C6FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12A9DF25-48E8-4D52-A267-1BE0437E9000\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C986533F-E320-46FA-A9F7-DAFDB1A0628A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C77DED4-2696-4172-92B7-43034E61F845\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BED1BA7D-B603-49D4-9080-4A9FEC056A69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"207B98DB-5962-4F62-AF5B-D48EF0C0E2A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFB65639-AE3A-4984-93F9-2A8100DCEE6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8921D08-FBA3-4C0A-8944-362909C5EB6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FBD5312-E44F-4996-AA29-AFED53A90E8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1B24C96-47DF-4FA2-8DF4-8241F4964F5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5067B83-AB9E-4819-B5A2-B14A96EB54C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"773B9BB2-0F65-4604-AF2C-8AC396DDC094\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA892169-0079-48D9-AEF5-641748CE1BF2\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string.\"}, {\"lang\": \"es\", \"value\": \"El analizador ASN.1 pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) en (a) strongSwan v2.8 anterior a v2.8.10, v4.2 anterior a v4.2.16, y v4.3 anterior a v4.3.2; y (b) openSwan v2.6 anterior a v2.6.22 y v2.4 anterior a v2.4.15 permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (ca\\u00edda del demonio IKE pluto) a trav\\u00e9s de un certificado X.509 con (1) Nombres Caracterizados Relativos (RDNs) (2) una cadena UTCTIME manipulada, o (3) una cadena GENERALIZEDTIME manipulada.\"}]", "id": "CVE-2009-2185", "lastModified": "2024-11-21T01:04:19.203", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2009-06-25T02:00:00.297", "references": "[{\"url\": \"http://download.strongswan.org/CHANGES2.txt\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://download.strongswan.org/CHANGES4.txt\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://download.strongswan.org/CHANGES42.txt\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35522\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35698\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/35740\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/35804\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/36922\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/36950\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/37504\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://up2date.astaro.com/2009/07/up2date_7404_released.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1898\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1899\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ingate.com/Relnote.php?ver=481\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-1138.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/35452\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securitytracker.com/id?1022428\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1639\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1706\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1829\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3354\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://download.strongswan.org/CHANGES2.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://download.strongswan.org/CHANGES4.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://download.strongswan.org/CHANGES42.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35522\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35698\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35740\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35804\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/36922\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/36950\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/37504\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://up2date.astaro.com/2009/07/up2date_7404_released.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1898\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2009/dsa-1899\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ingate.com/Relnote.php?ver=481\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-1138.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/35452\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securitytracker.com/id?1022428\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1639\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1706\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1829\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3354\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2009-2185\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-06-25T02:00:00.297\",\"lastModified\":\"2024-11-21T01:04:19.203\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string.\"},{\"lang\":\"es\",\"value\":\"El analizador ASN.1 pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) en (a) strongSwan v2.8 anterior a v2.8.10, v4.2 anterior a v4.2.16, y v4.3 anterior a v4.3.2; y (b) openSwan v2.6 anterior a v2.6.22 y v2.4 anterior a v2.4.15 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio IKE pluto) a trav\u00e9s de un certificado X.509 con (1) Nombres Caracterizados Relativos (RDNs) (2) una cadena UTCTIME manipulada, o (3) una cadena GENERALIZEDTIME manipulada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:2.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5518A917-D5D1-4985-BF71-B1A34BD3D5B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:2.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"778D7442-F54A-47DF-B87B-3CFA3CF08799\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:2.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A4B1F28-B3B8-4E31-8E4E-25F5A29F3AB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:2.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16984E6E-7CA8-4DC3-B800-FFE007617FE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:2.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C85F0BE-7E89-4B79-A036-9238785BE705\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:2.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DFF4780-2F92-4DF3-878A-C7E2BD57E39C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:2.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C794994-9367-4BBB-8940-BBB44B7C1C5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:2.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"082272D3-0FE4-4959-978A-FFF795B52CA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:2.8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DFEF9B3-C7F7-4588-A174-FAFD39C04116\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:2.8.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02A38BCE-66F9-49F9-8C48-DB3DA9E7054D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:2.8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E18EB62-1042-4F26-9EC3-B7EEA2182716\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C89C6007-3A8D-427D-8BE3-047DD52DE196\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97027262-849C-4DE9-90C9-0D9FBBC9F96B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8658539D-27D8-47EE-9468-A6B625E6D45F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89ACA351-D10F-4D1A-95B0-4B2E329F1E1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A4D6E89-5313-4016-8A7E-036579330DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95A8E226-FCEC-4545-A628-24F5A8103BCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B944D80-A8B9-4034-A95B-BA92ADC8D4E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5267BCC-A51C-4F3B-840C-49EF9C2A15F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CDCDB4B-2DF5-4394-B33A-08A4B6604D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66206A52-373C-4DBB-A3D7-2A7569C0181E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F654D3C4-D3A3-41E1-A0D8-3A384319AE08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41F9E10-000D-4F3B-BEA6-DEE87405B89B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F37DFE8-2996-4904-B733-7BAECA95CB48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38209DC9-3BE6-49EF-8BA1-6E2BC5D24FEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"155EB8F5-7C3C-4293-91EE-62DA561DA54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42B67A3-8650-426F-A8E8-DCA4180D787A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21CDA326-C5E4-4BAF-9DC6-4E5A57304C1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"384C0CAE-8AC3-47AA-9F1C-9DE6779CA583\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:strongswan:strongswan:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00BC4DA6-BFD1-43CF-B8B8-DACBF09E4721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7841F42-1226-43C4-A007-88847925D872\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77930F86-13FF-4787-A39F-2D00110AFBFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B1ADD64-2503-4EED-9F6F-E425A3406123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3067BE9-4314-42BD-8131-89C4899F7D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E00CA6E5-1F63-4D59-BA72-0F8697671718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35A2049-8502-41F2-894E-E39AEBEB6816\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD82E956-8C8E-4B38-9E82-4AA9AEFE6891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D0F0EA4-A0DF-48CC-9B42-465A36945503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78325087-599F-448B-8C47-570914FF6C59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"059CFA5C-B262-47AF-94A6-8E74AFB19204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12F25627-235B-4312-80A4-4E36DE0E72A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3E70B88-6348-42BB-AE96-46BDB1F3C6FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A9DF25-48E8-4D52-A267-1BE0437E9000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C986533F-E320-46FA-A9F7-DAFDB1A0628A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C77DED4-2696-4172-92B7-43034E61F845\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED1BA7D-B603-49D4-9080-4A9FEC056A69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"207B98DB-5962-4F62-AF5B-D48EF0C0E2A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB65639-AE3A-4984-93F9-2A8100DCEE6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8921D08-FBA3-4C0A-8944-362909C5EB6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FBD5312-E44F-4996-AA29-AFED53A90E8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B24C96-47DF-4FA2-8DF4-8241F4964F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5067B83-AB9E-4819-B5A2-B14A96EB54C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"773B9BB2-0F65-4604-AF2C-8AC396DDC094\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA892169-0079-48D9-AEF5-641748CE1BF2\"}]}]}],\"references\":[{\"url\":\"http://download.strongswan.org/CHANGES2.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://download.strongswan.org/CHANGES4.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://download.strongswan.org/CHANGES42.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35522\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35698\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35740\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35804\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/36922\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/36950\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/37504\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://up2date.astaro.com/2009/07/up2date_7404_released.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1898\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1899\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ingate.com/Relnote.php?ver=481\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1138.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/35452\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1022428\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1639\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1706\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1829\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3354\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://download.strongswan.org/CHANGES2.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://download.strongswan.org/CHANGES4.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://download.strongswan.org/CHANGES42.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35522\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35698\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35804\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36922\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36950\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37504\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://up2date.astaro.com/2009/07/up2date_7404_released.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1898\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1899\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ingate.com/Relnote.php?ver=481\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1138.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/35452\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1022428\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1639\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1706\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1829\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3354\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.