CVE-2015-4171

Impact:
Low
Public Date:
2015-06-08
Bugzilla:
1231178: CVE-2015-4171 strongswan: rogue servers are able to gain user credentials from a client in certain IKEv2 setups

The MITRE CVE dictionary describes this issue as:

strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.

Find out more about CVE-2015-4171 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the versions of strongimcv as shipped with Red Hat Enterprise Linux 7 as they did not include support for IKEv2.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 1.4
Base Metrics AV:A/AC:H/Au:S/C:P/I:N/A:N
Access Vector Adjacent Network
Access Complexity High
Authentication Single
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 strongimcv Not affected

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.