[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2483-1 strongswan -- authentication bypass

ID: oval:org.secpod.oval:def:600818Date: (C)2012-06-05   (M)2022-10-10
Class: PATCHFamily: unix




An authentication bypass issue was discovered by the Codenomicon CROSS project in strongSwan, an IPsec-based VPN solution. When using RSA-based setups, a missing check in the gmp plugin could allow an attacker presenting a forged signature to successfully authenticate against a strongSwan responder. The default configuration in Debian does not use the gmp plugin for RSA operations but rather the OpenSSL plugin, so the packages as shipped by Debian are not vulnerable.

Platform:
Debian 6.0
Product:
strongswan
Reference:
DSA-2483-1
CVE-2012-2388
CVE    1
CVE-2012-2388
CPE    36
cpe:/a:strongswan:strongswan:4.2.7
cpe:/a:strongswan:strongswan:4.3.6
cpe:/a:strongswan:strongswan:4.6.3
cpe:/a:strongswan:strongswan:4.2.6
...

© SecPod Technologies