The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-%28cve-2017-9022%29.html | |
http://www.debian.org/security/2017/dsa-3866 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/98760 | vdb entry third party advisory |
http://www.ubuntu.com/usn/USN-3301-1 | third party advisory vendor advisory |