Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1231178 - (CVE-2015-4171) CVE-2015-4171 strongswan: rogue servers are able to gain user credentials from a client in certain IKEv2 setups
CVE-2015-4171 strongswan: rogue servers are able to gain user credentials fro...
Status: CLOSED CURRENTRELEASE
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20150608,reported=2...
: Security
Depends On: 1231182 1231183
Blocks:
  Show dependency treegraph
 
Reported: 2015-06-12 06:57 EDT by Vasyl Kaigorodov
Modified: 2018-05-24 00:04 EDT (History)
2 users (show)

See Also:
Fixed In Version: strongSwan 5.3.2
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2018-05-24 00:04:11 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
strongswan-4.3.0-4.3.4_enforce_remote_auth.patch (3.72 KB, text/plain)
2015-06-12 07:00 EDT, Vasyl Kaigorodov
no flags Details
strongswan-4.3.5_enforce_remote_auth.patch (3.69 KB, text/plain)
2015-06-12 07:00 EDT, Vasyl Kaigorodov
no flags Details
strongswan-4.3.6_enforce_remote_auth.patch (2.95 KB, text/plain)
2015-06-12 07:01 EDT, Vasyl Kaigorodov
no flags Details
strongswan-4.4.0-4.5.0_enforce_remote_auth.patch (2.97 KB, text/plain)
2015-06-12 07:01 EDT, Vasyl Kaigorodov
no flags Details
strongswan-4.5.1-4.5.3_enforce_remote_auth.patch (2.90 KB, text/plain)
2015-06-12 07:01 EDT, Vasyl Kaigorodov
no flags Details
strongswan-4.6.0-4.6.4_enforce_remote_auth.patch (2.88 KB, text/plain)
2015-06-12 07:01 EDT, Vasyl Kaigorodov
no flags Details
strongswan-5.0.0-5.0.2_enforce_remote_auth.patch (2.91 KB, text/plain)
2015-06-12 07:01 EDT, Vasyl Kaigorodov
no flags Details
strongswan-5.0.3-5.0.4_enforce_remote_auth.patch (2.86 KB, text/plain)
2015-06-12 07:01 EDT, Vasyl Kaigorodov
no flags Details
strongswan-5.1.0-5.3.1_enforce_remote_auth.patch (2.92 KB, text/plain)
2015-06-12 07:01 EDT, Vasyl Kaigorodov
no flags Details

  None (edit)
Description Vasyl Kaigorodov 2015-06-12 06:57:16 EDT
Alexander E. Patrakov recently reported a vulnerability in strongSwan
that may enable rogue servers to gain user credentials from a client in
certain IKEv2 setups [1]. Affected are all strongSwan versions since
4.3.0 including the latest 5.3.1.

CVE-2015-4171 has been assigned for this vulnerability.

The problem occurs in IKEv2 connections where the server is
authenticated with a certificate and the client authenticates itself
with EAP or pre-shared keys. Any constraints the client has for the
server's authentication (e.g. rightid or rightca) are only enforced
after all authentication rounds are completed successfully. A rogue
server that is able to authenticate itself with a valid certificate
issued by any CA the client trusts, is, therefore, able to trick the
client into continuing its authentication. In case of EAP this causes
the client to reveal its username and password digest, and if it accepts
EAP-GTC it is even possible to force it into sending a plaintext
password. Please refer to the email by Alexander for a practical example:

[1] http://www.openwall.com/lists/oss-security/2015/05/29/6

The attached patches fix the vulnerability in the respective strongSwan
versions and should apply with appropriate hunk offsets.

Statement:

This issue did not affect the versions of strongimcv as shipped with Red Hat Enterprise Linux 7 as they did not include support for IKEv2.
Comment 1 Vasyl Kaigorodov 2015-06-12 07:00:56 EDT
Created attachment 1037990 [details]
strongswan-4.3.0-4.3.4_enforce_remote_auth.patch
Comment 2 Vasyl Kaigorodov 2015-06-12 07:00:59 EDT
Created attachment 1037991 [details]
strongswan-4.3.5_enforce_remote_auth.patch
Comment 3 Vasyl Kaigorodov 2015-06-12 07:01:02 EDT
Created attachment 1037992 [details]
strongswan-4.3.6_enforce_remote_auth.patch
Comment 4 Vasyl Kaigorodov 2015-06-12 07:01:05 EDT
Created attachment 1037993 [details]
strongswan-4.4.0-4.5.0_enforce_remote_auth.patch
Comment 5 Vasyl Kaigorodov 2015-06-12 07:01:09 EDT
Created attachment 1037995 [details]
strongswan-4.5.1-4.5.3_enforce_remote_auth.patch
Comment 6 Vasyl Kaigorodov 2015-06-12 07:01:12 EDT
Created attachment 1037996 [details]
strongswan-4.6.0-4.6.4_enforce_remote_auth.patch
Comment 7 Vasyl Kaigorodov 2015-06-12 07:01:14 EDT
Created attachment 1037997 [details]
strongswan-5.0.0-5.0.2_enforce_remote_auth.patch
Comment 8 Vasyl Kaigorodov 2015-06-12 07:01:17 EDT
Created attachment 1037998 [details]
strongswan-5.0.3-5.0.4_enforce_remote_auth.patch
Comment 9 Vasyl Kaigorodov 2015-06-12 07:01:20 EDT
Created attachment 1037999 [details]
strongswan-5.1.0-5.3.1_enforce_remote_auth.patch
Comment 10 Vasyl Kaigorodov 2015-06-12 07:01:49 EDT
Created strongswan tracking bugs for this issue:

Affects: fedora-all [bug 1231182]
Affects: epel-all [bug 1231183]

Note You need to log in before you can comment on or make changes to this bug.