Debian DSA-2483-1 : strongswan - authentication bypass

high Nessus Plugin ID 59761

Synopsis

The remote Debian host is missing a security-related update.

Description

An authentication bypass issue was discovered by the Codenomicon CROSS project in strongSwan, an IPsec-based VPN solution. When using RSA-based setups, a missing check in the gmp plugin could allow an attacker presenting a forged signature to successfully authenticate against a strongSwan responder.

The default configuration in Debian does not use the gmp plugin for RSA operations but rather the OpenSSL plugin, so the packages as shipped by Debian are not vulnerable.

Solution

Upgrade the strongswan packages.

For the stable distribution (squeeze), this problem has been fixed in version 4.4.1-5.2.

See Also

https://packages.debian.org/source/squeeze/strongswan

https://www.debian.org/security/2012/dsa-2483

Plugin Details

Severity: High

ID: 59761

File Name: debian_DSA-2483.nasl

Version: 1.8

Type: local

Agent: unix

Published: 6/29/2012

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:strongswan, cpe:/o:debian:debian_linux:6.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 5/31/2012

Reference Information

CVE: CVE-2012-2388

DSA: 2483