Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mg6m-fcfp-8xqm

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.

strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.

EPSS

Процентиль: 77%
0.01012
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
больше 10 лет назад

strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.

redhat
больше 10 лет назад

strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.

nvd
больше 10 лет назад

strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.

debian
больше 10 лет назад

strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client be ...

suse-cvrf
больше 10 лет назад

Security update for strongswan

EPSS

Процентиль: 77%
0.01012
Низкий

Дефекты

CWE-200