Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-8023

Опубликовано: 18 нояб. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

РелизСтатусПримечание
devel

released

5.1.2-0ubuntu7
esm-infra-legacy/trusty

released

5.1.2-0ubuntu2.4
esm-infra/xenial

released

5.1.2-0ubuntu7
precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

released

5.1.2-0ubuntu2.4
trusty/esm

released

5.1.2-0ubuntu2.4
upstream

released

5.3.4
vivid

released

5.1.2-0ubuntu5.3
vivid/stable-phone-overlay

DNE

Показывать по

EPSS

Процентиль: 74%
0.00799
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
около 10 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

nvd
около 10 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

debian
около 10 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-msch ...

suse-cvrf
около 10 лет назад

Security update for strongswan

suse-cvrf
около 10 лет назад

Security update for strongswan

EPSS

Процентиль: 74%
0.00799
Низкий

5 Medium

CVSS2