Unrated severityNVD Advisory· Published Jun 25, 2009· Updated Apr 23, 2026
CVE-2009-2185
CVE-2009-2185
Description
The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string.
Affected products
56cpe:2.3:a:strongswan:strongswan:2.8.0:*:*:*:*:*:*:*+ 29 more
- cpe:2.3:a:strongswan:strongswan:2.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.10:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.9:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.15:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*+ 25 more
- cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
24- www.securityfocus.com/bid/35452nvdPatch
- download.strongswan.org/CHANGES2.txtnvdVendor Advisory
- download.strongswan.org/CHANGES4.txtnvdVendor Advisory
- download.strongswan.org/CHANGES42.txtnvdVendor Advisory
- secunia.com/advisories/35522nvdVendor Advisory
- www.vupen.com/english/advisories/2009/1639nvdVendor Advisory
- secunia.com/advisories/35698nvd
- secunia.com/advisories/35740nvd
- secunia.com/advisories/35804nvd
- secunia.com/advisories/36922nvd
- secunia.com/advisories/36950nvd
- secunia.com/advisories/37504nvd
- up2date.astaro.com/2009/07/up2date_7404_released.htmlnvd
- www.debian.org/security/2009/dsa-1898nvd
- www.debian.org/security/2009/dsa-1899nvd
- www.ingate.com/Relnote.phpnvd
- www.redhat.com/support/errata/RHSA-2009-1138.htmlnvd
- www.securitytracker.com/idnvd
- www.vupen.com/english/advisories/2009/1706nvd
- www.vupen.com/english/advisories/2009/1829nvd
- www.vupen.com/english/advisories/2009/3354nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079nvd
- www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.htmlnvd
- www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.htmlnvd
News mentions
0No linked articles in our index yet.