strongSwan is prone to a remote authentication-bypass vulnerability.
Credit:
The original article can be found at: http://www.securityfocus.com/bid/53752
Vulnerable Systems:
* strongSwan strongSwan 4.4.1
* strongSwan strongSwan 4.4
* strongSwan strongSwan 4.3.7
* strongSwan strongSwan 4.3.6
* strongSwan strongSwan 4.3.5
* strongSwan strongSwan 4.3.3
* strongSwan strongSwan 4.3.2
* strongSwan strongSwan 4.3.1
* strongSwan strongSwan 4.3
* strongSwan strongSwan 4.2.17
* strongSwan strongSwan 4.2.16
* strongSwan strongSwan 4.2.15
* strongSwan strongSwan 4.2.14
* strongSwan strongSwan 4.2.13
* strongSwan strongSwan 4.2.7
* strongSwan strongSwan 4.2.6
* strongSwan strongSwan 4.1
* strongSwan strongSwan 2.8.11
* strongSwan strongSwan 2.8.10
* strongSwan strongSwan 2.8.9
* strongSwan strongSwan 2.8.8
* strongSwan strongSwan 2.1.3
* strongSwan strongSwan 4.3.4
An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions on the affected computer. This may aid in further attacks.
Vendor Status:
Vendor had issued an update for this Vulnerability
Patch Availability:
http://www.strongswan.org/download.html
CVE Information:
CVE-2012-2388
Disclosure Timeline:
Initial Release : Jun 04 2012
Please enable JavaScript to view the comments powered by Disqus.
blog comments powered by