The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate.
{
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "5.5.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*"
}