Bug 1231178 (CVE-2015-4171) - CVE-2015-4171 strongswan: rogue servers are able to gain user credentials from a client in certain IKEv2 setups
Summary: CVE-2015-4171 strongswan: rogue servers are able to gain user credentials fro...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2015-4171
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1231182 1231183
Blocks:
TreeView+ depends on / blocked
 
Reported: 2015-06-12 10:57 UTC by Vasyl Kaigorodov
Modified: 2021-02-17 05:13 UTC (History)
2 users (show)

Fixed In Version: strongSwan 5.3.2
Clone Of:
Environment:
Last Closed: 2018-05-24 04:04:11 UTC
Embargoed:


Attachments (Terms of Use)
strongswan-4.3.0-4.3.4_enforce_remote_auth.patch (3.72 KB, text/plain)
2015-06-12 11:00 UTC, Vasyl Kaigorodov
no flags Details
strongswan-4.3.5_enforce_remote_auth.patch (3.69 KB, text/plain)
2015-06-12 11:00 UTC, Vasyl Kaigorodov
no flags Details
strongswan-4.3.6_enforce_remote_auth.patch (2.95 KB, text/plain)
2015-06-12 11:01 UTC, Vasyl Kaigorodov
no flags Details
strongswan-4.4.0-4.5.0_enforce_remote_auth.patch (2.97 KB, text/plain)
2015-06-12 11:01 UTC, Vasyl Kaigorodov
no flags Details
strongswan-4.5.1-4.5.3_enforce_remote_auth.patch (2.90 KB, text/plain)
2015-06-12 11:01 UTC, Vasyl Kaigorodov
no flags Details
strongswan-4.6.0-4.6.4_enforce_remote_auth.patch (2.88 KB, text/plain)
2015-06-12 11:01 UTC, Vasyl Kaigorodov
no flags Details
strongswan-5.0.0-5.0.2_enforce_remote_auth.patch (2.91 KB, text/plain)
2015-06-12 11:01 UTC, Vasyl Kaigorodov
no flags Details
strongswan-5.0.3-5.0.4_enforce_remote_auth.patch (2.86 KB, text/plain)
2015-06-12 11:01 UTC, Vasyl Kaigorodov
no flags Details
strongswan-5.1.0-5.3.1_enforce_remote_auth.patch (2.92 KB, text/plain)
2015-06-12 11:01 UTC, Vasyl Kaigorodov
no flags Details

Description Vasyl Kaigorodov 2015-06-12 10:57:16 UTC
Alexander E. Patrakov recently reported a vulnerability in strongSwan
that may enable rogue servers to gain user credentials from a client in
certain IKEv2 setups [1]. Affected are all strongSwan versions since
4.3.0 including the latest 5.3.1.

CVE-2015-4171 has been assigned for this vulnerability.

The problem occurs in IKEv2 connections where the server is
authenticated with a certificate and the client authenticates itself
with EAP or pre-shared keys. Any constraints the client has for the
server's authentication (e.g. rightid or rightca) are only enforced
after all authentication rounds are completed successfully. A rogue
server that is able to authenticate itself with a valid certificate
issued by any CA the client trusts, is, therefore, able to trick the
client into continuing its authentication. In case of EAP this causes
the client to reveal its username and password digest, and if it accepts
EAP-GTC it is even possible to force it into sending a plaintext
password. Please refer to the email by Alexander for a practical example:

[1] http://www.openwall.com/lists/oss-security/2015/05/29/6

The attached patches fix the vulnerability in the respective strongSwan
versions and should apply with appropriate hunk offsets.

Statement:

This issue did not affect the versions of strongimcv as shipped with Red Hat Enterprise Linux 7 as they did not include support for IKEv2.

Comment 1 Vasyl Kaigorodov 2015-06-12 11:00:56 UTC
Created attachment 1037990 [details]
strongswan-4.3.0-4.3.4_enforce_remote_auth.patch

Comment 2 Vasyl Kaigorodov 2015-06-12 11:00:59 UTC
Created attachment 1037991 [details]
strongswan-4.3.5_enforce_remote_auth.patch

Comment 3 Vasyl Kaigorodov 2015-06-12 11:01:02 UTC
Created attachment 1037992 [details]
strongswan-4.3.6_enforce_remote_auth.patch

Comment 4 Vasyl Kaigorodov 2015-06-12 11:01:05 UTC
Created attachment 1037993 [details]
strongswan-4.4.0-4.5.0_enforce_remote_auth.patch

Comment 5 Vasyl Kaigorodov 2015-06-12 11:01:09 UTC
Created attachment 1037995 [details]
strongswan-4.5.1-4.5.3_enforce_remote_auth.patch

Comment 6 Vasyl Kaigorodov 2015-06-12 11:01:12 UTC
Created attachment 1037996 [details]
strongswan-4.6.0-4.6.4_enforce_remote_auth.patch

Comment 7 Vasyl Kaigorodov 2015-06-12 11:01:14 UTC
Created attachment 1037997 [details]
strongswan-5.0.0-5.0.2_enforce_remote_auth.patch

Comment 8 Vasyl Kaigorodov 2015-06-12 11:01:17 UTC
Created attachment 1037998 [details]
strongswan-5.0.3-5.0.4_enforce_remote_auth.patch

Comment 9 Vasyl Kaigorodov 2015-06-12 11:01:20 UTC
Created attachment 1037999 [details]
strongswan-5.1.0-5.3.1_enforce_remote_auth.patch

Comment 10 Vasyl Kaigorodov 2015-06-12 11:01:49 UTC
Created strongswan tracking bugs for this issue:

Affects: fedora-all [bug 1231182]
Affects: epel-all [bug 1231183]


Note You need to log in before you can comment on or make changes to this bug.