Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4qm7-rm85-wr68

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

EPSS

Процентиль: 74%
0.00799
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
около 10 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

redhat
около 10 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

nvd
около 10 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

debian
около 10 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-msch ...

suse-cvrf
около 10 лет назад

Security update for strongswan

EPSS

Процентиль: 74%
0.00799
Низкий

Дефекты

CWE-20