Lucene search

K
nvd[email protected]NVD:CVE-2021-41990
HistoryOct 18, 2021 - 2:15 p.m.

CVE-2021-41990

2021-10-1814:15:10
CWE-190
web.nvd.nist.gov

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.033 Low

EPSS

Percentile

91.4%

The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.

Affected configurations

NVD
Node
strongswanstrongswanRange5.6.15.9.4
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0
Node
fedoraprojectfedoraMatch33
OR
fedoraprojectfedoraMatch34
OR
fedoraprojectfedoraMatch35
Node
siemens6gk6108-4am00-2ba2Match-
AND
siemens6gk6108-4am00-2ba2_firmwareMatch-
Node
siemens6gk6108-4am00-2da2Match-
AND
siemens6gk6108-4am00-2da2_firmwareMatch-
Node
siemens6gk5804-0ap00-2aa2Match-
AND
siemens6gk5804-0ap00-2aa2_firmwareMatch-
Node
siemens6gk5812-1aa00-2aa2Match-
AND
siemens6gk5812-1aa00-2aa2_firmwareMatch-
Node
siemens6gk5812-1ba00-2aa2Match-
AND
siemens6gk5812-1ba00-2aa2_firmwareMatch-
Node
siemens6gk5816-1aa00-2aa2Match-
AND
siemens6gk5816-1aa00-2aa2_firmwareMatch-
Node
siemens6gk5816-1ba00-2aa2Match-
AND
siemens6gk5816-1ba00-2aa2_firmwareMatch-
Node
siemens6gk5826-2ab00-2ab2_firmwareMatch-
AND
siemens6gk5826-2ab00-2ab2Match-
Node
siemens6gk5874-2aa00-2aa2_firmwareMatch-
AND
siemens6gk5874-2aa00-2aa2Match-
Node
siemens6gk5874-3aa00-2aa2_firmwareMatch-
AND
siemens6gk5874-3aa00-2aa2Match-
Node
siemens6gk5876-3aa02-2ba2_firmwareMatch-
AND
siemens6gk5876-3aa02-2ba2Match-
Node
siemens6gk5876-3aa02-2ea2_firmwareMatch-
AND
siemens6gk5876-3aa02-2ea2Match-
Node
siemens6gk5876-4aa00-2ba2_firmwareMatch-
AND
siemens6gk5876-4aa00-2ba2Match-
Node
siemens6gk5876-4aa00-2da2_firmwareMatch-
AND
siemens6gk5876-4aa00-2da2Match-
Node
siemens6gk5856-2ea00-3da1_firmwareMatch-
AND
siemens6gk5856-2ea00-3da1Match-
Node
siemens6gk5856-2ea00-3aa1Match-
AND
siemens6gk5856-2ea00-3aa1_firmwareMatch-
Node
siemens6gk5615-0aa00-2aa2Match-
AND
siemens6gk5615-0aa00-2aa2_firmwareMatch-

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.033 Low

EPSS

Percentile

91.4%