An authentication bypass vulnerability was found in the strongSwan IKEv2 code. This flaw can be triggered by rekeying an unestablished IKE_SA while it is being actively initiated. This would allow an attacker to trick a peer's IKE_SA state to established, without having to provide any valid authentication credentials. While this flaw allows for the bypass of authentication, it does not allow for remote code execution. Only installations that actively initiate or re-authenticate IKEv2 IKE_SAs are afected; IKEv1 in charon or pluto is not affected. Acknowledgements: Red Hat would like to thank the strongSwan project for reporting this issue.
Created attachment 879664 [details] upstream patch for 5.x
libreswan and openswan are not vulnerable to this. openswan does not implement CREATE_CHILD_SA yet. Libreswan implements a stub that only provides an unconditional reject message.
Created strongswan tracking bugs for this issue: Affects: fedora-all [bug 1087859] Affects: epel-6 [bug 1087860]
Upstream advisory: http://www.strongswan.org/blog/2014/04/14/strongswan-authentication-bypass-vulnerability-%28cve-2014-2338%29.html Patches also available at: http://download.strongswan.org/security/CVE-2014-2338/
strongswan-5.1.3-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
strongswan-5.1.3-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.