In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
The product dereferences a pointer that it expects to be valid but is NULL.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Strongswan | Strongswan | 4.1.2 (including) | 5.9.5 (excluding) | 
| Strongswan | Ubuntu | bionic | * | 
| Strongswan | Ubuntu | devel | * | 
| Strongswan | Ubuntu | esm-infra-legacy/trusty | * | 
| Strongswan | Ubuntu | esm-infra/bionic | * | 
| Strongswan | Ubuntu | esm-infra/focal | * | 
| Strongswan | Ubuntu | esm-infra/xenial | * | 
| Strongswan | Ubuntu | fips-preview/jammy | * | 
| Strongswan | Ubuntu | fips-updates/bionic | * | 
| Strongswan | Ubuntu | fips-updates/focal | * | 
| Strongswan | Ubuntu | fips-updates/jammy | * | 
| Strongswan | Ubuntu | fips-updates/xenial | * | 
| Strongswan | Ubuntu | fips/bionic | * | 
| Strongswan | Ubuntu | fips/focal | * | 
| Strongswan | Ubuntu | fips/xenial | * | 
| Strongswan | Ubuntu | focal | * | 
| Strongswan | Ubuntu | hirsute | * | 
| Strongswan | Ubuntu | impish | * | 
| Strongswan | Ubuntu | jammy | * | 
| Strongswan | Ubuntu | kinetic | * | 
| Strongswan | Ubuntu | lunar | * | 
| Strongswan | Ubuntu | mantic | * | 
| Strongswan | Ubuntu | noble | * | 
| Strongswan | Ubuntu | oracular | * | 
| Strongswan | Ubuntu | plucky | * | 
| Strongswan | Ubuntu | questing | * | 
| Strongswan | Ubuntu | trusty | * | 
| Strongswan | Ubuntu | trusty/esm | * | 
| Strongswan | Ubuntu | upstream | * | 
| Strongswan | Ubuntu | xenial | * |