strongSwan IKE_SA_INIT and IKE_AUTH DoS Vulnerabilities

Summary
This host has installed strongSwan and is prone to Denial of Service Vulnerabilities.
Impact
Successful exploit allows attackers to run arbitrary code, corrupt memory, and can cause denial of service. Impact Level: Application
Solution
Upgrade to version 4.3.1 or 4.2.15 or apply patches http://download.strongswan.org/patches/ http://www.strongswan.org/download.htm ***** NOTE: Ignore this warning, if above mentioned Update is applied already. *****
Insight
The flaws are due to, - An error in charon/sa/ike_sa.c charon daemon which results in NULL pointer dereference and crash via an invalid 'IKE_SA_INIT' request that triggers 'an incomplete state,' followed by a 'CREATE_CHILD_SA' request. - An error in incharon/sa/tasks/child_create.c charon daemon, it switches the NULL checks for TSi and TSr payloads, via an 'IKE_AUTH' request without a 'TSi' or 'TSr' traffic selector.
Affected
strongSwan Version prior to 4.2.15 and 4.3.1
References