First published: Wed Nov 18 2015(Updated: )
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Ubuntu | =15.10 | |
strongSwan | =4.2.12 | |
strongSwan | =4.2.13 | |
strongSwan | =4.2.14 | |
strongSwan | =4.2.15 | |
strongSwan | =4.2.16 | |
strongSwan | =4.3.0 | |
strongSwan | =4.3.1 | |
strongSwan | =4.3.2 | |
strongSwan | =4.3.3 | |
strongSwan | =4.3.4 | |
strongSwan | =4.3.5 | |
strongSwan | =4.3.6 | |
strongSwan | =4.3.7 | |
strongSwan | =4.4.0 | |
strongSwan | =4.4.1 | |
strongSwan | =4.5.0 | |
strongSwan | =4.5.1 | |
strongSwan | =4.5.2 | |
strongSwan | =4.5.3 | |
strongSwan | =4.6.0 | |
strongSwan | =4.6.1 | |
strongSwan | =4.6.2 | |
strongSwan | =4.6.3 | |
strongSwan | =4.6.4 | |
strongSwan | =5.0.0 | |
strongSwan | =5.0.1 | |
strongSwan | =5.0.2 | |
strongSwan | =5.0.3 | |
strongSwan | =5.0.4 | |
strongSwan | =5.1.0 | |
strongSwan | =5.1.1 | |
strongSwan | =5.1.2 | |
strongSwan | =5.1.3 | |
strongSwan | =5.2.0 | |
strongSwan | =5.2.1 | |
strongSwan | =5.2.2 | |
strongSwan | =5.2.3 | |
strongSwan | =5.3.0 | |
strongSwan | =5.3.1 | |
strongSwan | =5.3.2 | |
strongSwan | =5.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8023 is classified as a medium severity vulnerability due to its ability to allow authentication bypass.
To fix CVE-2015-8023, update strongSwan to version 5.3.4 or later.
CVE-2015-8023 affects strongSwan versions from 4.2.12 up to, but not including, 5.3.4.
CVE-2015-8023 affects Ubuntu Linux versions 14.04, 15.04, and 15.10, as well as multiple versions of strongSwan.
CVE-2015-8023 exploits improper validation of local state in the EAP-MSCHAPv2 protocol, allowing remote attackers to bypass authentication.