Vulnerability Details : CVE-2009-0790
The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD.
Vulnerability category: Memory CorruptionInput validationDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2009-0790
Probability of exploitation activity in the next 30 days: 90.70%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-0790
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
[email protected] |
CWE ids for CVE-2009-0790
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: [email protected] (Primary)
References for CVE-2009-0790
-
http://www.securityfocus.com/archive/1/502270/100/0/threaded
-
http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt
Vendor Advisory
- http://www.debian.org/security/2009/dsa-1760
-
http://www.securityfocus.com/bid/34296
Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/49523
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171
-
http://www.vupen.com/english/advisories/2009/0886
-
http://www.debian.org/security/2009/dsa-1759
Patch
-
http://download.strongswan.org/CHANGES4.txt
Vendor Advisory
-
http://www.securitytracker.com/id?1021949
-
http://www.securitytracker.com/id?1021950
- http://www.redhat.com/support/errata/RHSA-2009-0402.html
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
Products affected by CVE-2009-0790
- cpe:2.3:a:strongswan:strongswan:4.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.4.0a:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:2.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*