FreeBSD : strongswan -- authentication bypass vulnerability in the eap-mschapv2 plugin (3eb0ccc2-8c6a-11e5-8519-005056ac623e)

medium Nessus Plugin ID 86889

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Strongswan Release Notes reports :

Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin that was caused by insufficient verification of the internal state when handling MSCHAPv2 Success messages received by the client.
This vulnerability has been registered as CVE-2015-8023.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?43e9da13

http://www.nessus.org/u?d111ce17

Plugin Details

Severity: Medium

ID: 86889

File Name: freebsd_pkg_3eb0ccc28c6a11e58519005056ac623e.nasl

Version: 2.5

Type: local

Published: 11/17/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:strongswan, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 11/16/2015

Vulnerability Publication Date: 11/16/2015

Reference Information

CVE: CVE-2015-8023