[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3282-1 strongswan -- strongswan

ID: oval:org.secpod.oval:def:24884Date: (C)2015-06-12   (M)2021-06-02
Class: PATCHFamily: unix




Alexander E. Patrakov discovered an issue in strongSwan, an IKE/IPsec suite used to establish IPsec protected links. When an IKEv2 client authenticates the server with certificates and the client authenticates itself to the server using pre-shared key or EAP, the constraints on the server certificate are only enforced by the client after all authentication steps are completed successfully. A rogue server which can authenticate using a valid certificate issued by any CA trusted by the client could trick the user into continuing the authentication, revealing the username and password digest or even the cleartext password .

Platform:
Debian 8.x
Debian 7.x
Product:
strongswan
Reference:
DSA-3282-1
CVE-2015-4171
CVE    1
CVE-2015-4171
CPE    3
cpe:/o:debian:debian_linux:7.x
cpe:/o:debian:debian_linux:8.x
cpe:/a:strongswan:strongswan

© SecPod Technologies