Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-8023

Опубликовано: 16 нояб. 2015
Источник: redhat
CVSS2: 6.4

Описание

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

Отчет

This issue did not affect the versions of strongimcv as shipped with Red Hat Enterprise Linux 7, as they did not include support for the eap-mschapv2 plugin.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7strongimcvNot affected

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1283219strongswan: Authentication bypass in eap-mschapv2 plugin

6.4 Medium

CVSS2

Связанные уязвимости

ubuntu
около 10 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

nvd
около 10 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

debian
около 10 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-msch ...

suse-cvrf
около 10 лет назад

Security update for strongswan

suse-cvrf
около 10 лет назад

Security update for strongswan

6.4 Medium

CVSS2