Debian DSA-4309-1 : strongswan - security update

high Nessus Plugin ID 117890

Synopsis

The remote Debian host is missing a security-related update.

Description

Google's OSS-Fuzz revealed an exploitable bug in the gmp plugin caused by the patch that fixes CVE-2018-16151 and CVE-2018-16152 (DSA-4305-1).

An attacker could trigger it using crafted certificates with RSA keys with very small moduli. Verifying signatures with such keys would cause an integer underflow and subsequent heap buffer overflow resulting in a crash of the daemon. While arbitrary code execution is not completely ruled out because of the heap buffer overflow, due to the form of the data written to the buffer it seems difficult to actually exploit it in such a way.

Solution

Upgrade the strongswan packages.

For the stable distribution (stretch), this problem has been fixed in version 5.5.1-4+deb9u4.

See Also

https://security-tracker.debian.org/tracker/CVE-2018-16151

https://security-tracker.debian.org/tracker/CVE-2018-16152

https://security-tracker.debian.org/tracker/source-package/strongswan

https://packages.debian.org/source/stretch/strongswan

https://www.debian.org/security/2018/dsa-4309

Plugin Details

Severity: High

ID: 117890

File Name: debian_DSA-4309.nasl

Version: 1.6

Type: local

Agent: unix

Published: 10/3/2018

Updated: 2/17/2022

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2018-17540

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:strongswan, cpe:/o:debian:debian_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 10/1/2018

Vulnerability Publication Date: 10/3/2018

Reference Information

CVE: CVE-2018-17540

DSA: 4309