SB2018061701 - Debian update for strongswan
Published: June 17, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Buffer underflow (CVE-ID: CVE-2018-5388)
The vulnerability allows a local attacker to cause DoS condition on the target system.
The vulnerability exists due to buffer underflow stroke_socket.c while improper checking of packet length. A local attacker can submit specially crafted packets, trigger resource exhaustion and cause the service to crash while reading from the socket.
2) Memory corruption (CVE-ID: CVE-2018-10811)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists in the Internet Key Exchange Version 2 (IKEv2) key derivation of strongSwan due to insufficient initialization of the variable that stores the SKEYSEED for IKEv2 key derivation before using the negotiated pseudorandom function (PRF). A remote attacker can trigger a key derivation failure and cause the affected software to clear the uninitialized memory that may lead to crash.
Remediation
Install update from vendor's website.