The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.
References
| Link | Resource |
|---|---|
| https://github.com/strongswan/strongswan/releases/tag/5.9.4 | Release Notes Third Party Advisory |
| https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41990).html | Vendor Advisory |
| https://www.debian.org/security/2021/dsa-4989 | Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/ | Mailing List Third Party Advisory |
| https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2021-10-18 14:15
Updated : 2022-02-08 13:15
NVD link : CVE-2021-41990
Mitre link : CVE-2021-41990
JSON object : View
Products Affected
fedoraproject
- fedora
debian
- debian_linux
strongswan
- strongswan
CWE
CWE-190
Integer Overflow or Wraparound
