漏洞信息详情
strongSwan 输入验证错误漏洞
漏洞简介
strongSwan是瑞士Andreas Steffen个人开发者的一套Linux平台使用的开源的基于IPsec的VPN解决方案。该方案包含X.509公开密钥证书、安全储存私钥、智能卡等认证机制。
StrongSwan 中存在输入验证错误漏洞,该漏洞源于产品使用随机数生成器生成缓存条数。攻击者可通过多个请求填充缓存并替换缓存导致服务错误或远程代码执行。以下产品及版本受到影响:StrongSwan 5.9.4 之前版本。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/strongswan/strongswan/releases/tag/5.9.4
参考网址
来源:CONFIRM
链接:https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/10/msg00014.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/
来源:MISC
链接:https://github.com/strongswan/strongswan/releases/tag/5.9.4
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/
来源:DEBIAN
链接:https://www.debian.org/security/2021/dsa-4989
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2021-41991
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2021-41991
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/strongSwan-integer-overflow-via-In-memory-Certificate-Cache-36667
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3463
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164558/Ubuntu-Security-Notice-USN-5111-2.html
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021101947
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3488
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164554/Ubuntu-Security-Notice-USN-5111-1.html
受影响实体
暂无
补丁
- strongSwan 输入验证错误漏洞的修复措施<!--2021-10-18-->
还没有评论,来说两句吧...