FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

strongSwan -- Heap-based buffer overflow in eap-mschapv2 plugin due to improper handling of failure request packets

Affected packages
4.2.12 <= strongswan < 6.0.3

Details

VuXML ID 1f1cf967-b35c-11f0-bce7-bc2411002f50
Discovery 2025-10-27
Entry 2025-10-27

Xu Biang reports:

The eap-mschapv2 plugin doesn't correctly check the length of an EAP-MSCHAPv2 Failure Request packet on the client, which can cause an integer underflow that leads to a crash and, depending on the compiler options, even a heap-based buffer overflow that's potentially exploitable for remote code execution. Affected are all strongSwan versions since 4.2.12.

References

CVE Name CVE-2025-62291
URL https://www.cve.org/CVERecord?id=CVE-2025-62291