[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2903-1 strongswan -- strongswan

ID: oval:org.secpod.oval:def:601265Date: (C)2014-07-25   (M)2022-10-10
Class: PATCHFamily: unix




An authentication bypass vulnerability was found in charon, the daemon handling IKEv2 in strongSwan, an IKE/IPsec suite. The state machine handling the security association handled some state transitions incorrectly. An attacker can trigger the vulnerability by rekeying an unestablished IKE_SA during the initiation itself. This will trick the IKE_SA state to "established" without the need to provide any valid credential. Vulnerable setups include those actively initiating IKEv2 IKE_SA but also during re-authentication . Installations using IKEv1 is not affected.

Platform:
Debian 7.0
Debian 6.0
Product:
strongswan
Reference:
DSA-2903-1
CVE-2014-2338
CVE    1
CVE-2014-2338
CPE    60
cpe:/a:strongswan:strongswan:4.1.8
cpe:/a:strongswan:strongswan:4.3.6
cpe:/a:strongswan:strongswan:4.1.7
cpe:/a:strongswan:strongswan:4.3.5
...

© SecPod Technologies