Untriaged
Permalink
CVE-2025-62291
8.1 HIGH
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a …
In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.
References
Affected products
strongSwan
- <6.0.3
Matching in nixpkgs
pkgs.strongswan
OpenSource IPsec-based VPN Solution
pkgs.strongswanNM
OpenSource IPsec-based VPN Solution
pkgs.strongswanTNC
OpenSource IPsec-based VPN Solution
pkgs.strongswanTPM
OpenSource IPsec-based VPN Solution