Логотип exploitDog
bind:CVE-2015-8023
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-8023

Количество 9

Количество 9

ubuntu логотип

CVE-2015-8023

около 10 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

CVSS2: 5
EPSS: Низкий
redhat логотип

CVE-2015-8023

около 10 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

CVSS2: 6.4
EPSS: Низкий
nvd логотип

CVE-2015-8023

около 10 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2015-8023

около 10 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-msch ...

CVSS2: 5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2015:2103-1

около 10 лет назад

Security update for strongswan

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:2186-1

около 10 лет назад

Security update for strongswan

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:2183-2

около 10 лет назад

Security update for strongswan

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:2183-1

около 10 лет назад

Security update for strongswan

EPSS: Низкий
github логотип

GHSA-4qm7-rm85-wr68

больше 3 лет назад

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2015-8023

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

CVSS2: 5
1%
Низкий
около 10 лет назад
redhat логотип
CVE-2015-8023

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

CVSS2: 6.4
1%
Низкий
около 10 лет назад
nvd логотип
CVE-2015-8023

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

CVSS2: 5
1%
Низкий
около 10 лет назад
debian логотип
CVE-2015-8023

The server implementation of the EAP-MSCHAPv2 protocol in the eap-msch ...

CVSS2: 5
1%
Низкий
около 10 лет назад
suse-cvrf логотип
openSUSE-SU-2015:2103-1

Security update for strongswan

1%
Низкий
около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:2186-1

Security update for strongswan

1%
Низкий
около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:2183-2

Security update for strongswan

1%
Низкий
около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:2183-1

Security update for strongswan

1%
Низкий
около 10 лет назад
github логотип
GHSA-4qm7-rm85-wr68

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу