Skip to content

Commit 4059532

Browse files
committed
mention that it was found by Kev
1 parent e227e21 commit 4059532

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

strongSwan/CVE-2018-5388/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Buffer overflow in strongSwan VPN's charon server (CVE-2018-5388)
22

3-
This directory contains a proof-of-concept exploit for a buffer overflow vulnerability in [strongSwan](https://www.strongswan.org/) VPN's [charon](https://wiki.strongswan.org/projects/strongswan/wiki/Charon) daemon. The bug was assigned [CVE-2018-5388](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5388). It was fixed in strongSwan version [5.6.3](https://www.strongswan.org/blog/2018/05/28/strongswan-5.6.3-released.html).
3+
This directory contains a proof-of-concept exploit for a buffer overflow vulnerability in [strongSwan](https://www.strongswan.org/) VPN's [charon](https://wiki.strongswan.org/projects/strongswan/wiki/Charon) daemon. The vulnerability was discovered by Kevin Backhouse of the Semmle Security Research Team and has been assigned [CVE-2018-5388](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5388). It was fixed in strongSwan version [5.6.3](https://www.strongswan.org/blog/2018/05/28/strongswan-5.6.3-released.html), which was released on 28 May 2018.
44

55
# The bug
66

0 commit comments

Comments
 (0)