FreeBSD : strongswan -- authentication bypass vulnerability in the eap-mschapv2 plugin (3eb0ccc2-8c6a-11e5-8519-005056ac623e)

Medium Nessus Plugin ID 86889


The remote FreeBSD host is missing a security-related update.


Strongswan Release Notes reports :

Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin that was caused by insufficient verification of the internal state when handling MSCHAPv2 Success messages received by the client.
This vulnerability has been registered as CVE-2015-8023.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 86889

File Name: freebsd_pkg_3eb0ccc28c6a11e58519005056ac623e.nasl

Version: $Revision: 2.2 $

Type: local

Published: 2015/11/17

Modified: 2015/11/20

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:strongswan, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2015/11/16

Vulnerability Publication Date: 2015/11/16

Reference Information

CVE: CVE-2015-8023