Bug 1231178 (CVE-2015-4171)

Summary: CVE-2015-4171 strongswan: rogue servers are able to gain user credentials from a client in certain IKEv2 setups
Product: [Other] Security Response Reporter: Vasyl Kaigorodov <vkaigoro>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED CURRENTRELEASE QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: avagarwa, pwouters
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: strongSwan 5.3.2 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-05-24 04:04:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1231182, 1231183    
Bug Blocks:    
Attachments:
Description Flags
strongswan-4.3.0-4.3.4_enforce_remote_auth.patch
none
strongswan-4.3.5_enforce_remote_auth.patch
none
strongswan-4.3.6_enforce_remote_auth.patch
none
strongswan-4.4.0-4.5.0_enforce_remote_auth.patch
none
strongswan-4.5.1-4.5.3_enforce_remote_auth.patch
none
strongswan-4.6.0-4.6.4_enforce_remote_auth.patch
none
strongswan-5.0.0-5.0.2_enforce_remote_auth.patch
none
strongswan-5.0.3-5.0.4_enforce_remote_auth.patch
none
strongswan-5.1.0-5.3.1_enforce_remote_auth.patch none

Description Vasyl Kaigorodov 2015-06-12 10:57:16 UTC
Alexander E. Patrakov recently reported a vulnerability in strongSwan
that may enable rogue servers to gain user credentials from a client in
certain IKEv2 setups [1]. Affected are all strongSwan versions since
4.3.0 including the latest 5.3.1.

CVE-2015-4171 has been assigned for this vulnerability.

The problem occurs in IKEv2 connections where the server is
authenticated with a certificate and the client authenticates itself
with EAP or pre-shared keys. Any constraints the client has for the
server's authentication (e.g. rightid or rightca) are only enforced
after all authentication rounds are completed successfully. A rogue
server that is able to authenticate itself with a valid certificate
issued by any CA the client trusts, is, therefore, able to trick the
client into continuing its authentication. In case of EAP this causes
the client to reveal its username and password digest, and if it accepts
EAP-GTC it is even possible to force it into sending a plaintext
password. Please refer to the email by Alexander for a practical example:

[1] http://www.openwall.com/lists/oss-security/2015/05/29/6

The attached patches fix the vulnerability in the respective strongSwan
versions and should apply with appropriate hunk offsets.

Statement:

This issue did not affect the versions of strongimcv as shipped with Red Hat Enterprise Linux 7 as they did not include support for IKEv2.

Comment 1 Vasyl Kaigorodov 2015-06-12 11:00:56 UTC
Created attachment 1037990 [details]
strongswan-4.3.0-4.3.4_enforce_remote_auth.patch

Comment 2 Vasyl Kaigorodov 2015-06-12 11:00:59 UTC
Created attachment 1037991 [details]
strongswan-4.3.5_enforce_remote_auth.patch

Comment 3 Vasyl Kaigorodov 2015-06-12 11:01:02 UTC
Created attachment 1037992 [details]
strongswan-4.3.6_enforce_remote_auth.patch

Comment 4 Vasyl Kaigorodov 2015-06-12 11:01:05 UTC
Created attachment 1037993 [details]
strongswan-4.4.0-4.5.0_enforce_remote_auth.patch

Comment 5 Vasyl Kaigorodov 2015-06-12 11:01:09 UTC
Created attachment 1037995 [details]
strongswan-4.5.1-4.5.3_enforce_remote_auth.patch

Comment 6 Vasyl Kaigorodov 2015-06-12 11:01:12 UTC
Created attachment 1037996 [details]
strongswan-4.6.0-4.6.4_enforce_remote_auth.patch

Comment 7 Vasyl Kaigorodov 2015-06-12 11:01:14 UTC
Created attachment 1037997 [details]
strongswan-5.0.0-5.0.2_enforce_remote_auth.patch

Comment 8 Vasyl Kaigorodov 2015-06-12 11:01:17 UTC
Created attachment 1037998 [details]
strongswan-5.0.3-5.0.4_enforce_remote_auth.patch

Comment 9 Vasyl Kaigorodov 2015-06-12 11:01:20 UTC
Created attachment 1037999 [details]
strongswan-5.1.0-5.3.1_enforce_remote_auth.patch

Comment 10 Vasyl Kaigorodov 2015-06-12 11:01:49 UTC
Created strongswan tracking bugs for this issue:

Affects: fedora-all [bug 1231182]
Affects: epel-all [bug 1231183]