Vulnerability   
Search   
    Search 191973 CVE descriptions
and 86218 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.702665
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 2665-1 (strongswan - authentication bypass)
Summary:Kevin Wojtysiak discovered a vulnerability in strongSwan, an IPsec;based VPN solution.;;When using the OpenSSL plugin for ECDSA based authentication, an empty,;zeroed or otherwise invalid signature is handled as a legitimate one.;An attacker could use a forged signature to authenticate like a legitimate;user and gain access to the VPN (and everything protected by this).;;While the issue looks like CVE-2012-2388;;(RSA signature based authentication bypass), it is unrelated.
Description:Summary:
Kevin Wojtysiak discovered a vulnerability in strongSwan, an IPsec
based VPN solution.

When using the OpenSSL plugin for ECDSA based authentication, an empty,
zeroed or otherwise invalid signature is handled as a legitimate one.
An attacker could use a forged signature to authenticate like a legitimate
user and gain access to the VPN (and everything protected by this).

While the issue looks like CVE-2012-2388

(RSA signature based authentication bypass), it is unrelated.

Affected Software/OS:
strongswan on Debian Linux

Solution:
For the stable distribution (squeeze), this problem has been fixed in
version 4.4.1-5.3.

For the testing distribution (wheezy), this problem has been fixed in
version 4.5.2-1.5+deb7u1.

For the unstable distribution (sid), this problem has been fixed in
version 4.6.4-7.

We recommend that you upgrade your strongswan packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-2388
BugTraq ID: 53752
http://www.securityfocus.com/bid/53752
Debian Security Information: DSA-2483 (Google Search)
http://www.debian.org/security/2012/dsa-2483
http://osvdb.org/82587
http://www.securitytracker.com/id?1027110
http://secunia.com/advisories/49315
http://secunia.com/advisories/49336
http://secunia.com/advisories/49370
http://secunia.com/advisories/55051
SuSE Security Announcement: openSUSE-SU-2012:0691 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00002.html
XForce ISS Database: strongswan-rsa-security-bypass(76013)
https://exchange.xforce.ibmcloud.com/vulnerabilities/76013
Common Vulnerability Exposure (CVE) ID: CVE-2013-2944
BugTraq ID: 59580
http://www.securityfocus.com/bid/59580
Debian Security Information: DSA-2665 (Google Search)
http://www.debian.org/security/2013/dsa-2665
http://download.strongswan.org/patches/10_openssl_ecdsa_signature_patch/strongswan-4.3.5-5.0.3_openssl_ecdsa_signature.patch
SuSE Security Announcement: openSUSE-SU-2013:0774 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-05/msg00014.html
SuSE Security Announcement: openSUSE-SU-2013:0873 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-06/msg00010.html
SuSE Security Announcement: openSUSE-SU-2013:0985 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-06/msg00121.html
CopyrightCopyright (C) 2013 Greenbone Networks GmbH http://greenbone.net

This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2020 E-Soft Inc. All rights reserved.