In the eap-mschapv2 plugin (client-side) in strongSwan...
High severity
Unreviewed
Published
Jan 16, 2026
to the GitHub Advisory Database
•
Updated Jan 16, 2026
Description
Published by the National Vulnerability Database
Jan 16, 2026
Published to the GitHub Advisory Database
Jan 16, 2026
Last updated
Jan 16, 2026
In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.
References