Vulnerability Description
The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Strongswan | Strongswan | <= 5.5.2 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2017/dsa-3866Third Party Advisory
- http://www.securityfocus.com/bid/98756Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-3301-1Third Party Advisory
- https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-%28cve-2017-
- http://www.debian.org/security/2017/dsa-3866Third Party Advisory
- http://www.securityfocus.com/bid/98756Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-3301-1Third Party Advisory
- https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-%28cve-2017-
FAQ
What is CVE-2017-9023?
CVE-2017-9023 is a vulnerability with a CVSS score of 7.5 (HIGH). The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted ce...
How severe is CVE-2017-9023?
CVE-2017-9023 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-9023?
Check the references section above for vendor advisories and patch information. Affected products include: Strongswan Strongswan.