CVE Vulnerabilities

CVE-2021-45079

NULL Pointer Dereference

Published: Jan 31, 2022 | Modified: Nov 21, 2024
CVSS 3.x
9.1
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
HIGH
root.io logo minimus.io logo echo.ai logo

In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
StrongswanStrongswan4.1.2 (including)5.9.5 (excluding)
StrongswanUbuntubionic*
StrongswanUbuntudevel*
StrongswanUbuntuesm-infra-legacy/trusty*
StrongswanUbuntuesm-infra/bionic*
StrongswanUbuntuesm-infra/focal*
StrongswanUbuntuesm-infra/xenial*
StrongswanUbuntufips-preview/jammy*
StrongswanUbuntufips-updates/bionic*
StrongswanUbuntufips-updates/focal*
StrongswanUbuntufips-updates/jammy*
StrongswanUbuntufips-updates/xenial*
StrongswanUbuntufips/bionic*
StrongswanUbuntufips/focal*
StrongswanUbuntufips/xenial*
StrongswanUbuntufocal*
StrongswanUbuntuhirsute*
StrongswanUbuntuimpish*
StrongswanUbuntujammy*
StrongswanUbuntukinetic*
StrongswanUbuntulunar*
StrongswanUbuntumantic*
StrongswanUbuntunoble*
StrongswanUbuntuoracular*
StrongswanUbuntuplucky*
StrongswanUbuntuquesting*
StrongswanUbuntutrusty*
StrongswanUbuntutrusty/esm*
StrongswanUbuntuupstream*
StrongswanUbuntuxenial*

Potential Mitigations

References