In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Strongswan | Strongswan | 4.1.2 (including) | 5.9.5 (excluding) |
Strongswan | Ubuntu | bionic | * |
Strongswan | Ubuntu | devel | * |
Strongswan | Ubuntu | esm-infra/xenial | * |
Strongswan | Ubuntu | fips-preview/jammy | * |
Strongswan | Ubuntu | fips-updates/bionic | * |
Strongswan | Ubuntu | fips-updates/focal | * |
Strongswan | Ubuntu | fips-updates/jammy | * |
Strongswan | Ubuntu | fips-updates/xenial | * |
Strongswan | Ubuntu | fips/bionic | * |
Strongswan | Ubuntu | fips/focal | * |
Strongswan | Ubuntu | fips/xenial | * |
Strongswan | Ubuntu | focal | * |
Strongswan | Ubuntu | hirsute | * |
Strongswan | Ubuntu | impish | * |
Strongswan | Ubuntu | jammy | * |
Strongswan | Ubuntu | kinetic | * |
Strongswan | Ubuntu | lunar | * |
Strongswan | Ubuntu | mantic | * |
Strongswan | Ubuntu | noble | * |
Strongswan | Ubuntu | oracular | * |
Strongswan | Ubuntu | trusty | * |
Strongswan | Ubuntu | trusty/esm | * |
Strongswan | Ubuntu | upstream | * |
Strongswan | Ubuntu | xenial | * |