Vulnerability Details : CVE-2009-0790
The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD.
Vulnerability category: Memory CorruptionInput validationDenial of service
Products affected by CVE-2009-0790
- cpe:2.3:a:strongswan:strongswan:4.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.4.0a:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-0790
84.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-0790
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2009-0790
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-0790
-
http://www.securityfocus.com/archive/1/502270/100/0/threaded
-
http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt
Page not found ยท GitHub PagesVendor Advisory
-
http://www.debian.org/security/2009/dsa-1760
[SECURITY] [DSA 1760-1] New openswan packages fix denial of servicePatch
-
http://www.securityfocus.com/bid/34296
Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/49523
Openswan and strongSwan DPD denial of service CVE-2009-0790 Vulnerability Report
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171
404 Not Found
-
http://www.vupen.com/english/advisories/2009/0886
Site en construction
-
http://www.debian.org/security/2009/dsa-1759
[SECURITY] [DSA 1759-1] New strongswan packages fix denial of servicePatch
-
http://download.strongswan.org/CHANGES4.txt
Page Not Found - strongSwan DownloadsVendor Advisory
-
http://www.securitytracker.com/id?1021949
-
http://www.securitytracker.com/id?1021950
Access Denied
-
http://www.redhat.com/support/errata/RHSA-2009-0402.html
Support
-
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2009:009 - openSUSE Security Announce - openSUSE Mailing Lists
Jump to