Lucene search

K
ubuntucveUbuntu.comUB:CVE-2015-8023
HistoryNov 16, 2015 - 12:00 a.m.

CVE-2015-8023

2015-11-1600:00:00
ubuntu.com
ubuntu.com
10

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.005

Percentile

77.1%

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2
plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly
validate local state, which allows remote attackers to bypass
authentication via an empty Success message in response to an initial
Challenge message.

OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchstrongswan< 5.1.2-0ubuntu2.4UNKNOWN
ubuntu15.04noarchstrongswan< 5.1.2-0ubuntu5.3UNKNOWN
ubuntu15.10noarchstrongswan< 5.1.2-0ubuntu6.2UNKNOWN
ubuntu16.04noarchstrongswan< 5.1.2-0ubuntu7UNKNOWN
ubuntu16.10noarchstrongswan< 5.1.2-0ubuntu7UNKNOWN
ubuntu17.04noarchstrongswan< 5.1.2-0ubuntu7UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.005

Percentile

77.1%