Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-45079

Опубликовано: 31 янв. 2022
Источник: debian
EPSS Низкий

Описание

In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
strongswanfixed5.9.5-1package

Примечания

  • https://www.strongswan.org/blog/2022/01/24/strongswan-vulnerability-(cve-2021-45079).html

  • Patches: https://download.strongswan.org/security/CVE-2021-45079/

EPSS

Процентиль: 34%
0.00136
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 4 лет назад

In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.

CVSS3: 9.1
nvd
около 4 лет назад

In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.

CVSS3: 9.1
msrc
почти 4 года назад

Описание отсутствует

suse-cvrf
почти 4 года назад

Security update for strongswan

suse-cvrf
почти 4 года назад

Security update for strongswan

EPSS

Процентиль: 34%
0.00136
Низкий