strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication. Attackers can exploit the failure to validate AVP length fields before subtraction to trigger excessive memory allocation or NULL pointer dereference, crashing the charon IKE daemon.
Project Subscriptions
No data.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6176-1 | strongswan security update |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 23 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | strongSwan EAP-TTLS AVP Parsing Integer Underflow | strongSwan 4.5.0 < 6.0.5 EAP-TTLS AVP Parsing Integer Underflow |
Mon, 23 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication. Attackers can exploit the failure to validate AVP length fields before subtraction to trigger excessive memory allocation or NULL pointer dereference, crashing the charon IKE daemon. | |
| Title | strongSwan EAP-TTLS AVP Parsing Integer Underflow | |
| Weaknesses | CWE-191 CWE-476 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-23T19:16:09.076Z
Reserved: 2026-01-28T21:47:35.121Z
Link: CVE-2026-25075
No data.
Status : Received
Published: 2026-03-23T19:16:39.313
Modified: 2026-03-23T19:16:39.313
Link: CVE-2026-25075
No data.
OpenCVE Enrichment
No data.
Debian DSA