CVE-2018-5388

Name
CVE-2018-5388
Description
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
Third Party Advisory http://www.kb.cert.org/vuls/id/338343
Third Party Advisory http://www.securityfocus.com/bid/104263
Third Party Advisory https://www.debian.org/security/2018/dsa-4229
Third Party Advisory https://usn.ubuntu.com/3771-1/
Third Party Advisory https://security.gentoo.org/glsa/201811-16
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00047.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:* strongswan >= None < 5.6.3

Vulnerable and fixed packages

Source package Branch Version Maintainer Status