5

CVE-2015-8023

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CanonicalUbuntu Linux Version14.04 SwEditionlts
CanonicalUbuntu Linux Version15.04
CanonicalUbuntu Linux Version15.10
StrongswanStrongswan Version4.2.12
StrongswanStrongswan Version4.2.13
StrongswanStrongswan Version4.2.14
StrongswanStrongswan Version4.2.15
StrongswanStrongswan Version4.2.16
StrongswanStrongswan Version4.3.0
StrongswanStrongswan Version4.3.1
StrongswanStrongswan Version4.3.2
StrongswanStrongswan Version4.3.3
StrongswanStrongswan Version4.3.4
StrongswanStrongswan Version4.3.5
StrongswanStrongswan Version4.3.6
StrongswanStrongswan Version4.3.7
StrongswanStrongswan Version4.4.0
StrongswanStrongswan Version4.4.1
StrongswanStrongswan Version4.5.0
StrongswanStrongswan Version4.5.1
StrongswanStrongswan Version4.5.2
StrongswanStrongswan Version4.5.3
StrongswanStrongswan Version4.6.0
StrongswanStrongswan Version4.6.1
StrongswanStrongswan Version4.6.2
StrongswanStrongswan Version4.6.3
StrongswanStrongswan Version4.6.4
StrongswanStrongswan Version5.0.0
StrongswanStrongswan Version5.0.1
StrongswanStrongswan Version5.0.2
StrongswanStrongswan Version5.0.3
StrongswanStrongswan Version5.0.4
StrongswanStrongswan Version5.1.0
StrongswanStrongswan Version5.1.1
StrongswanStrongswan Version5.1.2
StrongswanStrongswan Version5.1.3
StrongswanStrongswan Version5.2.0
StrongswanStrongswan Version5.2.1
StrongswanStrongswan Version5.2.2
StrongswanStrongswan Version5.2.3
StrongswanStrongswan Version5.3.0
StrongswanStrongswan Version5.3.1
StrongswanStrongswan Version5.3.2
StrongswanStrongswan Version5.3.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.8% 0.73
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:P/A:N
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.