7.5
CVSSv2

CVE-2012-2388

Published: 27/06/2012 Updated: 29/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The GMP Plugin in strongSwan 4.2.0 up to and including 4.6.3 allows remote malicious users to bypass authentication via a (1) empty or (2) zeroed RSA signature, aka "RSA signature verification vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

strongswan strongswan 4.2.16

strongswan strongswan 4.2.9

strongswan strongswan 4.2.6

strongswan strongswan 4.2.15

strongswan strongswan 4.2.1

strongswan strongswan 4.3.2

strongswan strongswan 4.6.0

strongswan strongswan 4.6.1

strongswan strongswan 4.4.1

strongswan strongswan 4.2.11

strongswan strongswan 4.2.10

strongswan strongswan 4.2.5

strongswan strongswan 4.2.0

strongswan strongswan 4.3.5

strongswan strongswan 4.4.0

strongswan strongswan 4.5.1

strongswan strongswan 4.5.0

strongswan strongswan 4.2.13

strongswan strongswan 4.2.12

strongswan strongswan 4.2.3

strongswan strongswan 4.2.4

strongswan strongswan 4.3.4

strongswan strongswan 4.3.3

strongswan strongswan 4.3.6

strongswan strongswan 4.5.3

strongswan strongswan 4.5.2

strongswan strongswan 4.2.8

strongswan strongswan 4.2.7

strongswan strongswan 4.2.14

strongswan strongswan 4.2.2

strongswan strongswan 4.3.1

strongswan strongswan 4.3.0

strongswan strongswan 4.6.2

strongswan strongswan 4.6.3

Vendor Advisories

An authentication bypass issue was discovered by the Codenomicon CROSS project in strongSwan, an IPsec-based VPN solution When using RSA-based setups, a missing check in the gmp plugin could allow an attacker presenting a forged signature to successfully authenticate against a strongSwan responder The default configuration in Debian does not use ...
Kevin Wojtysiak discovered a vulnerability in strongSwan, an IPsec based VPN solution When using the OpenSSL plugin for ECDSA based authentication, an empty, zeroed or otherwise invalid signature is handled as a legitimate one An attacker could use a forged signature to authenticate like a legitimate user and gain access to the VPN (and everythin ...