Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title strongSwan VPN charon server vulnerable to buffer underflow
Informations
Name VU#338343 First vendor Publication 2018-05-23
Vendor VU-CERT Last vendor Modification 2018-06-13
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:N/I:N/A:P)
Cvss Base Score 4 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#338343

strongSwan VPN charon server vulnerable to buffer underflow

Original Release date: 23 May 2018 | Last revised: 13 Jun 2018

Overview

strongSwan VPN's charon server prior to version 5.6.3 does not check packet length and may allow buffer underflow, resulting in denial of service.

Description

CWE-124: Buffer Underwrite ('Buffer Underflow') - CVE-2018-5388

In stroke_socket.c, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.

According to the vendor, an attacker must typically have local root permissions to access the socket. However, other accounts and groups such as the vpn group (if capability dropping in enabled, for example) may also have sufficient permissions, but this configuration does not appear to be the default behavior.

Impact

A remote attacker with local user credentials (possibly a normal user in the vpn group, or root) may be able to underflow the buffer and cause a denial of service.

Solution

Apply an update

StrongSwan version 5.6.3 and above contain a patch for this issue.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
strongSwanAffected21 Mar 201824 May 2018
SUSE LinuxAffected23 May 201824 May 2018
Alpine LinuxUnknown23 May 201823 May 2018
Arch LinuxUnknown23 May 201823 May 2018
Arista Networks, Inc.Unknown23 May 201823 May 2018
ASP LinuxUnknown23 May 201823 May 2018
CentOSUnknown23 May 201823 May 2018
CoreOSUnknown23 May 201823 May 2018
Debian GNU/LinuxUnknown23 May 201823 May 2018
ENEAUnknown23 May 201823 May 2018
Fedora ProjectUnknown23 May 201823 May 2018
GeexboxUnknown23 May 201823 May 2018
Gentoo LinuxUnknown23 May 201823 May 2018
HomeSeerUnknown23 May 201823 May 2018
Micro FocusUnknown23 May 201823 May 2018
If you are a vendor and your product is affected, let us know.View More »

CVSS Metrics (Learn More)

GroupScoreVector
Base4.9AV:N/AC:H/Au:S/C:N/I:N/A:C
Temporal3.8E:POC/RL:OF/RC:C
Environmental3.9CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

  • https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4
  • http://cwe.mitre.org/data/definitions/124.html

Credit

Thanks to Kevin Backhouse of Semmle Ltd. for reporting this vulnerability.

This document was written by Garret Wassermann.

Other Information

  • CVE IDs:CVE-2018-5388
  • Date Public:22 May 2018
  • Date First Published:23 May 2018
  • Date Last Updated:13 Jun 2018
  • Document Revision:39

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/338343

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-787 Out-of-bounds Write (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 132
Os 3
Os 2

Nessus® Vulnerability Scanner

Date Description
2019-01-03 Name : The remote Fedora host is missing a security update.
File : fedora_2018-3731a89e20.nasl - Type : ACT_GATHER_INFO
2018-11-27 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201811-16.nasl - Type : ACT_GATHER_INFO
2018-08-17 Name : The remote PhotonOS host is missing multiple security updates.
File : PhotonOS_PHSA-2018-1_0-0164.nasl - Type : ACT_GATHER_INFO
2018-08-17 Name : The remote PhotonOS host is missing multiple security updates.
File : PhotonOS_PHSA-2018-2_0-0075.nasl - Type : ACT_GATHER_INFO
2018-06-18 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4229.nasl - Type : ACT_GATHER_INFO
2018-06-04 Name : The remote Fedora host is missing a security update.
File : fedora_2018-bab8cabe2a.nasl - Type : ACT_GATHER_INFO
2018-06-01 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_7fc3e82764a511e8aedb00224d821998.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2018-07-09 17:21:02
  • Multiple Updates
2018-06-13 21:18:32
  • Multiple Updates
2018-05-31 17:21:27
  • Multiple Updates
2018-05-24 21:18:54
  • Multiple Updates
2018-05-23 21:18:33
  • First insertion