Home
HIGH: 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HDefault status
unaffected
4.2.12 (semver) before 6.0.3
affected
Description
In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.
Problem types
CWE-191 Integer Underflow (Wrap or Wraparound)
Product status
4.2.12 (semver) before 6.0.3
References
lists.debian.org/debian-lts-announce/2025/11/msg00002.html
github.com/strongswan/strongswan/releases
github.com/...mits/master/src/libcharon/plugins/eap_mschapv2
www.strongswan.org/...an-vulnerability-(cve-2025-62291).html