CVE Vulnerabilities

CVE-2021-45079

NULL Pointer Dereference

Published: Jan 31, 2022 | Modified: Nov 21, 2024
CVSS 3.x
9.1
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
HIGH

In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Strongswan Strongswan 4.1.2 (including) 5.9.5 (excluding)
Strongswan Ubuntu bionic *
Strongswan Ubuntu devel *
Strongswan Ubuntu esm-infra/xenial *
Strongswan Ubuntu fips-preview/jammy *
Strongswan Ubuntu fips-updates/bionic *
Strongswan Ubuntu fips-updates/focal *
Strongswan Ubuntu fips-updates/jammy *
Strongswan Ubuntu fips-updates/xenial *
Strongswan Ubuntu fips/bionic *
Strongswan Ubuntu fips/focal *
Strongswan Ubuntu fips/xenial *
Strongswan Ubuntu focal *
Strongswan Ubuntu hirsute *
Strongswan Ubuntu impish *
Strongswan Ubuntu jammy *
Strongswan Ubuntu kinetic *
Strongswan Ubuntu lunar *
Strongswan Ubuntu mantic *
Strongswan Ubuntu noble *
Strongswan Ubuntu oracular *
Strongswan Ubuntu trusty *
Strongswan Ubuntu trusty/esm *
Strongswan Ubuntu upstream *
Strongswan Ubuntu xenial *

Potential Mitigations

References