CVE-2015-4171
10.06.2015, 18:59
strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.Enginsight
Vendor | Product | Version |
---|---|---|
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 14.10 |
canonical | ubuntu_linux | 15.04 |
debian | debian_linux | 8.0 |
strongswan | strongswan | 4.3.0 |
strongswan | strongswan | 4.3.1 |
strongswan | strongswan | 4.3.2 |
strongswan | strongswan | 4.3.3 |
strongswan | strongswan | 4.3.4 |
strongswan | strongswan | 4.3.5 |
strongswan | strongswan | 4.3.6 |
strongswan | strongswan | 4.3.7 |
strongswan | strongswan | 4.4.0 |
strongswan | strongswan | 4.4.1 |
strongswan | strongswan | 4.5.0 |
strongswan | strongswan | 4.5.1 |
strongswan | strongswan | 4.5.2 |
strongswan | strongswan | 4.5.3 |
strongswan | strongswan | 4.6.0 |
strongswan | strongswan | 4.6.1 |
strongswan | strongswan | 4.6.2 |
strongswan | strongswan | 4.6.3 |
strongswan | strongswan | 4.6.4 |
strongswan | strongswan | 5.0.0 |
strongswan | strongswan | 5.0.1 |
strongswan | strongswan | 5.0.2 |
strongswan | strongswan | 5.0.3 |
strongswan | strongswan | 5.0.4 |
strongswan | strongswan | 5.1.0 |
strongswan | strongswan | 5.1.1 |
strongswan | strongswan | 5.1.2 |
strongswan | strongswan | 5.1.3 |
strongswan | strongswan | 5.2.0 |
strongswan | strongswan | 5.2.1 |
strongswan | strongswan | 5.2.2 |
strongswan | strongswan | 5.2.3 |
strongswan | strongswan | 5.3.0 |
strongswan | strongswan | 5.3.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References