Unrated severityNVD Advisory· Published May 31, 2018· Updated Aug 5, 2024
CVE-2018-5388
CVE-2018-5388
Description
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
Affected products
1- Range: 5.6.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.htmlmitrevendor-advisory
- lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.htmlmitrevendor-advisory
- lists.opensuse.org/opensuse-security-announce/2020-03/msg00047.htmlmitrevendor-advisory
- www.kb.cert.org/vuls/id/338343mitrethird-party-advisory
- security.gentoo.org/glsa/201811-16mitrevendor-advisory
- usn.ubuntu.com/3771-1/mitrevendor-advisory
- www.debian.org/security/2018/dsa-4229mitrevendor-advisory
- www.securityfocus.com/bid/104263mitrevdb-entry
- packetstormsecurity.com/files/172833/strongSwan-VPN-Charon-Server-Buffer-Overflow.htmlmitre
News mentions
0No linked articles in our index yet.