[manjaro-security] [ASA-201802-10] strongswan: denial of service
Morten Linderud
foxboron at archlinux.org
Thu Feb 22 00:32:07 CET 2018
Arch Linux Security Advisory ASA-201802-10
==========================================
Severity: Medium
Date : 2018-02-21
CVE-ID : CVE-2018-6459
Package : strongswan
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-625
Summary
=======
The package strongswan before version 5.6.2-1 is vulnerable to denial
of service.
Resolution
==========
Upgrade to 5.6.2-1.
# pacman -Syu "strongswan>=5.6.2-1"
The problem has been fixed upstream in version 5.6.2.
Workaround
==========
None.
Description
===========
The rsa_pss_params_parse function in
libstrongswan/credentials/keys/signature_params.c before strongSwan
5.6.2 allows remote attackers to cause a denial of service via a
crafted RSASSA-PSS signature that lacks a mask generation function
parameter.
Impact
======
A remote attacker is able to crash the application by providing a
maliciously-crafted signature.
References
==========
https://bugs.archlinux.org/task/57597
https://www.strongswan.org/blog/2018/02/19/strongswan-vulnerability-(cve-2018-6459).html
https://download.strongswan.org/security/CVE-2018-6459/strongswan-5.6.1_pss_mgf1_alg.patch
https://github.com/strongswan/strongswan/commit/40da179f28b768ffcf6ff7e2f68675eb44806668
https://security.archlinux.org/CVE-2018-6459
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20180222/f9704709/attachment.sig>
More information about the manjaro-security
mailing list