mailing list archives
[MU-200809-01] strongSwan IKEv2 Denial-of-Service Vulnerability
From: noreply () mudynamics com
Date: Thu, 18 Sep 2008 16:49:51 -0700 (PDT)
-----BEGIN PGP SIGNED MESSAGE-----
strongSwan IKEv2 Denial-of-Service Vulnerability [MU-200809-01]
September 18, 2008
strongswan 4.2.6 and other branches
strongSwan is an Open Source IPsec-based VPN Solution for the Linux operating system.
An IKE_SA_INIT message with a Key Exchange payload containing a large number of
NULL values can cause a crash of the IKEv2 charon daemon. The problem is
strongSwan dereferences a NULL pointer returned by the mpz_export() function
of the GNU Multiprecision Library (GMP).
Vendor Response / Solution:
Fixed in strongSwan 4.2.7 and other branches.
Available from www.strongswan.org/
September 16, 2008 - First contact with vendor
September 17, 2008 - Vendor releases fix
This vulnerability was discovered by the Mu Dynamics research team.
Mu Dynamics proactively eliminates the high cost of service, application and
network downtime. Mu's solution automates a systematic and repeatable process
that identifies hard-to-detect sources of potential downtime within IP services,
applications, and underlying networks. The award-winning Mu solution is deployed
at more than 100 locations, primarily at leading global service providers, cable
operators and network product vendors. Headquartered in Sunnyvale, California,
Mu is backed by leading venture capital firms that include Accel Partners,
Benchmark Capital, DAG Ventures and Focus Ventures. For more information, visit
the company's website at http://www.mudynamics.com.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (Darwin)
-----END PGP SIGNATURE-----
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- [MU-200809-01] strongSwan IKEv2 Denial-of-Service Vulnerability noreply (Sep 20)