Vulnerability Details : CVE-2014-9221
strongSwan 4.5.x through 5.2.x before 5.2.1 allows remote attackers to cause a denial of service (invalid pointer dereference) via a crafted IKEv2 Key Exchange (KE) message with Diffie-Hellman (DH) group 1025.
Vulnerability category: Denial of service
Products affected by CVE-2014-9221
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-9221
7.91%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-9221
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-9221
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-9221
-
http://strongswan.org/blog/2015/01/05/strongswan-denial-of-service-vulnerability-%28cve-2014-9221%29.html
strongSwan - strongSwan Denial-of-Service Vulnerability (CVE-2014-9221)
-
http://www.ubuntu.com/usn/USN-2450-1
USN-2450-1: strongSwan vulnerability | Ubuntu security noticesThird Party Advisory
-
http://secunia.com/advisories/62095
Sign inPermissions Required;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153825.html
[SECURITY] Fedora 21 Update: strongswan-5.2.2-2.fc21Third Party Advisory
-
http://secunia.com/advisories/62083
Sign in
-
http://secunia.com/advisories/62071
Sign inPermissions Required;Third Party Advisory
-
http://secunia.com/advisories/62663
Sign inPermissions Required;Third Party Advisory
-
http://strongswan.org/blog/2015/01/05/strongswan-denial-of-service-vulnerability-(cve-2014-9221).html
strongSwan - strongSwan Denial-of-Service Vulnerability (CVE-2014-9221)
-
http://lists.opensuse.org/opensuse-updates/2015-01/msg00054.html
openSUSE-SU-2015:0114-1: moderate: Security update for strongswanThird Party Advisory
-
http://www.securityfocus.com/bid/71894
Strongswan IKEv2 Payloads CVE-2014-9221 Remote Denial Of Service Vulnerability
-
http://strongswan.org/blog/2015/01/05/strongswan-5.2.2-released.html
strongSwan - strongSwan 5.2.2 ReleasedVendor Advisory
-
http://www.debian.org/security/2015/dsa-3118
Debian -- Security Information -- DSA-3118-1 strongswanThird Party Advisory
Jump to