Bugzilla – Bug 847506
VUL-0: CVE-2013-6075: strongswan DoS and authorization bypass vulnerability via crafted ID payload
Last modified: 2013-12-23 19:04:52 UTC
This is an autogenerated message for OBS integration: This bug (847506) was mentioned in https://build.opensuse.org/request/show/205538 12.2 / strongswan https://build.opensuse.org/request/show/205539 12.3 / strongswan https://build.opensuse.org/request/show/205541 Factory / strongswan
This is an autogenerated message for OBS integration: This bug (847506) was mentioned in https://build.opensuse.org/request/show/205685 Maintenance /
public http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-%28cve-2013-6075%29.html strongSwan Denial-of-Service Vulnerability and Potential Authorization Bypass (CVE-2013-6075) Posted on Nov 01, 2013 by tobias | Tags: 4.x, 5.0.x, 5.1.x, security fix A DoS vulnerability and potential authorization bypass triggered by a crafted ID_DER_ASN1_DN ID payload was discovered in strongSwan. All versions since 4.3.3 are affected. A crash report from one of our partners lead to the discovery of a DoS vulnerability and potential authorization bypass in strongSwan (CVE-2013-6075). Affected are strongSwan versions 4.3.3 and newer, up to 5.1.0. The bug can be triggered by a crafted ID_DER_ASN1_DN ID payload and is caused by an insufficient length check when comparing such identities. There are two possible attack vectors targeting this vulnerability. DoS Attack A crafted ID payload may be sent to cause memory reads outside the specified boundaries or a NULL dereference. As a result the IKE daemon might crash. As no write operation is performed, it is unlikely that injecting code is possible through this attack. Authorization Bypass With a crafted ID payload, an attacker might impersonate a different user and get access to VPN connection profiles it wouldn't have to. This requires, however, that a user gets successfully authenticated with appropriate credentials. It seems quite difficult to construct such an attack, but we can't rule out the possibility at this time. Fix The just released strongSwan 5.1.1 fixes this vulnerability. For older releases we provide a patch that fixes the vulnerability in versions 4.3.3 and newer and should apply to all version.
openSUSE-SU-2013:1646-1: An update that fixes one vulnerability is now available. Category: security (low) Bug References: 847506 CVE References: CVE-2013-6075 Sources used: openSUSE 12.3 (src): strongswan-5.0.1-4.12.1
openSUSE-SU-2013:1651-1: An update that solves one vulnerability and has one errata is now available. Category: security (low) Bug References: 840826,847506 CVE References: CVE-2013-6075 Sources used: openSUSE 11.4 (src): strongswan-4.5.0-6.60.1
This is an autogenerated message for OBS integration: This bug (847506) was mentioned in https://build.opensuse.org/request/show/207810 Evergreen:11.2:Test / strongswan
Update released for: strongswan, strongswan-debuginfo, strongswan-debugsource, strongswan-doc Products: SLE-DEBUGINFO 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLE-DESKTOP 11-SP3 (i386, x86_64) SLE-SERVER 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP3 (i386, x86_64)
Update released for: strongswan, strongswan-debuginfo, strongswan-debugsource, strongswan-doc Products: SLE-SERVER 11-SP1-TERADATA (x86_64)
Update released for: strongswan, strongswan-debuginfo, strongswan-debugsource, strongswan-doc Products: SLE-DEBUGINFO 11-SP2 (i386, ia64, ppc64, s390x, x86_64) SLE-DESKTOP 11-SP2 (i386, x86_64) SLE-SERVER 11-SP2 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP2 (i386, x86_64)
SUSE-SU-2013:1866-2: An update that solves one vulnerability and has two fixes is now available. Category: security (moderate) Bug References: 833278,840826,847506 CVE References: CVE-2013-5018 Sources used: SUSE Linux Enterprise Server 11 SP2 for VMware (src): strongswan-4.4.0-6.21.1 SUSE Linux Enterprise Server 11 SP2 (src): strongswan-4.4.0-6.21.1 SUSE Linux Enterprise Desktop 11 SP2 (src): strongswan-4.4.0-6.21.1
done
SUSE-SU-2013:1866-3: An update that solves one vulnerability and has two fixes is now available. Category: security (moderate) Bug References: 833278,840826,847506 CVE References: CVE-2013-5018 Sources used: SUSE Linux Enterprise Server 10 SP4 LTSS (src): strongswan-4.4.0-6.15.1