Debian Security Advisory
DSA-2903-1 strongswan -- security update
- Date Reported:
- 14 Apr 2014
- Affected Packages:
- strongswan
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2014-2338.
- More information:
-
An authentication bypass vulnerability was found in charon, the daemon handling IKEv2 in strongSwan, an IKE/IPsec suite. The state machine handling the security association (IKE_SA) handled some state transitions incorrectly.
An attacker can trigger the vulnerability by rekeying an unestablished IKE_SA during the initiation itself. This will trick the IKE_SA state to
established
without the need to provide any valid credential.Vulnerable setups include those actively initiating IKEv2 IKE_SA (like ”clients” or “roadwarriors”) but also during re-authentication (which can be initiated by the responder). Installations using IKEv1 (pluto daemon in strongSwan 4 and earlier, and IKEv1 code in charon 5.x) is not affected.
For the oldstable distribution (squeeze), this problem has been fixed in version 4.4.1-5.5.
For the stable distribution (wheezy), this problem has been fixed in version 4.5.2-1.5+deb7u3.
For the unstable distribution (sid), this problem has been fixed in version 5.1.2-4.
We recommend that you upgrade your strongswan packages.