[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2665-1 strongswan -- authentication bypass

ID: oval:org.secpod.oval:def:601009Date: (C)2013-05-01   (M)2022-10-10
Class: PATCHFamily: unix




Kevin Wojtysiak discovered a vulnerability in strongSwan, an IPsec based VPN solution. When using the openssl plugin for ECDSA based authentication, an empty, zeroed or otherwise invalid signature is handled as a legitimate one. An attacker could use a forged signature to authenticate like a legitimate user and gain access to the VPN . While the issue looks like CVE-2012-2388 , it is unrelated.

Platform:
Debian 6.0
Product:
strongswan
Reference:
DSA-2665-1
CVE-2013-2944
CVE-2012-2388
CVE    2
CVE-2013-2944
CVE-2012-2388
CPE    41
cpe:/a:strongswan:strongswan:4.2.7
cpe:/a:strongswan:strongswan:4.3.6
cpe:/a:strongswan:strongswan:4.6.3
cpe:/a:strongswan:strongswan:4.2.6
...

© SecPod Technologies