From fb22be0918729226a5f2a6deef5218f291348bd3 Mon Sep 17 00:00:00 2001 From: Renato Botelho Date: Mon, 16 Nov 2015 14:06:56 +0000 Subject: Register CVE 2015-8023 on VuXML. It affects strongswan < 5.3.4 --- security/vuxml/vuln.xml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index c89af2020bcf..35e4139fbb4d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,35 @@ Notes: --> + + strongswan -- authentication bypass vulnerability in the eap-mschapv2 plugin + + + strongswan + 5.3.4 + + + + +

Strongswan Release Notes reports:

+
+

Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin that + was caused by insufficient verification of the internal state when handling + MSCHAPv2 Success messages received by the client. + This vulnerability has been registered as CVE-2015-8023.

+
+ +
+ + CVE-2015-8023 + ihttps://github.com/strongswan/strongswan/commit/453e204ac40dfff2e0978e8f84a5f8ff0cbc45e2 + + + 2015-11-16 + 2015-11-16 + +
+ moodle -- multiple vulnerabilities -- cgit v1.2.3