{"vuid":"VU#338343","idnumber":"338343","name":"strongSwan VPN charon server vulnerable to buffer underflow","keywords":["underflow","vpn"],"overview":"strongSwan VPN's charon server prior to version 5.6.3 does not check packet length and may allow buffer underflow, resulting in denial of service.","clean_desc":"CWE-124: Buffer Underwrite ('Buffer Underflow') - CVE-2018-5388 In stroke_socket.c, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. According to the vendor, an attacker must typically have local root permissions to access the socket. However, other accounts and groups such as the vpn group (if capability dropping in enabled, for example) may also have sufficient permissions, but this configuration does not appear to be the default behavior.","impact":"A remote attacker with local user credentials (possibly a normal user in the vpn group, or root) may be able to underflow the buffer and cause a denial of service.","resolution":"Apply an update StrongSwan version 5.6.3 and above contain a patch for this issue.","workarounds":"","sysaffected":"","thanks":"Thanks to Kevin Backhouse of Semmle Ltd. for reporting this vulnerability.","author":"This document was written by Garret Wassermann.","public":["https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=0acd1ab4","http://cwe.mitre.org/data/definitions/124.html"],"cveids":["CVE-2018-5388"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2018-03-20T21:17:50Z","publicdate":"2018-05-22T00:00:00Z","datefirstpublished":"2018-05-23T15:13:14Z","dateupdated":"2018-06-13T16:07:17Z","revision":40,"vrda_d1_directreport":"1","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"H","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"N","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4.9","cvss_basevector":"AV:N/AC:H/Au:S/C:N/I:N/A:C","cvss_temporalscore":"3.8","cvss_environmentalscore":"3.85851701088","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}