The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/98756 | third party advisory vdb entry |
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-%28cve-2017-9023%29.html | |
http://www.debian.org/security/2017/dsa-3866 | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-3301-1 | third party advisory vendor advisory |