Lines 58-63
Link Here
|
58 |
|
58 |
|
59 |
--> |
59 |
--> |
60 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
60 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
|
|
61 |
<vuln vid="9e3e5d6f-8c5b-11e5-9930-00167671dd1d"> |
62 |
<topic>strongSwan -- eap-mschapv2 plugin authentication bypass vulnerability</topic> |
63 |
<affects> |
64 |
<package> |
65 |
<name>strongswan</name> |
66 |
<range><lt>5.3.4</lt></range> |
67 |
</package> |
68 |
</affects> |
69 |
<description> |
70 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
71 |
<p>strongSwan security team reports:</p> |
72 |
<blockquote cite="https://www.strongswan.org/blog/2015/11/16/strongswan-vulnerability-%28cve-2015-8023%29.html"> |
73 |
<p>Affected are IKEv2 connections that use EAP-MSCHAPv2 to authenticate clients via our own eap-mschapv2 plugin. It doesn't matter if it is used directly (rightauth=eap-mschapv2) or tunneled in EAP-PEAP or EAP-TTLS (rightauth=eap-peap|ttls and phase2_method = mschapv2) or if the eap-dynamic plugin is used (rightauth=eap-dynamic) with the eap-mschapv2 plugin being loaded.</p> |
74 |
<p>Installations that use RADIUS to provide EAP-MSCHAPv2 authentication to their clients (rightauth=eap-radius) are not affected (provided the RADIUS server's EAP-MSCHAPv2 implementation is correct).</p> |
75 |
<p>Due to insufficient validation of its local state the server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin can be tricked into successfully concluding the authentication without providing valid credentials. In fact, the client can simply send the last message in the process described above (i.e. an empty Success message) as response to the server's Challenge message to pass the EAP-MSCHAPv2 authentication successfully.</p> |
76 |
</blockquote> |
77 |
</body> |
78 |
</description> |
79 |
<references> |
80 |
<cvename>CVE-2015-8023</cvename> |
81 |
</references> |
82 |
<dates> |
83 |
<discovery>2015-11-05</discovery> |
84 |
<entry>2015-11-16</entry> |
85 |
</dates> |
86 |
</vuln> |
87 |
|
61 |
<vuln vid="82b3ca2a-8c07-11e5-bd18-002590263bf5"> |
88 |
<vuln vid="82b3ca2a-8c07-11e5-bd18-002590263bf5"> |
62 |
<topic>moodle -- multiple vulnerabilities</topic> |
89 |
<topic>moodle -- multiple vulnerabilities</topic> |
63 |
<affects> |
90 |
<affects> |