In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Strongswan | Ubuntu | devel | * |
| Strongswan | Ubuntu | fips-updates/jammy | * |
| Strongswan | Ubuntu | jammy | * |
| Strongswan | Ubuntu | noble | * |
| Strongswan | Ubuntu | plucky | * |
| Strongswan | Ubuntu | questing | * |