Описание
IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 5.1.2-0ubuntu2 |
| esm-infra-legacy/trusty | released | 5.1.2-0ubuntu2 |
| esm-infra/xenial | released | 5.1.2-0ubuntu2 |
| lucid | ignored | end of life |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| quantal | ignored | end of life |
| saucy | ignored | end of life |
| trusty | released | 5.1.2-0ubuntu2 |
| trusty/esm | released | 5.1.2-0ubuntu2 |
Показывать по
6.4 Medium
CVSS2
Связанные уязвимости
IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.
IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypa ...
IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
6.4 Medium
CVSS2