{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2015-4171", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "[oss-security] 20150529 Re: StrongSwan VPN client for Android leaks username to rouge server", "refsource" : "MLIST", "url" : "http://www.openwall.com/lists/oss-security/2015/05/29/7" }, { "name" : "[oss-security] 20150529 StrongSwan VPN client for Android leaks username to rouge server", "refsource" : "MLIST", "url" : "http://www.openwall.com/lists/oss-security/2015/05/29/6" }, { "name" : "[oss-security] 20150608 Re: StrongSwan VPN client for Android leaks username to rouge server", "refsource" : "MLIST", "url" : "http://www.openwall.com/lists/oss-security/2015/06/08/4" }, { "name" : "https://play.google.com/store/apps/details?id=org.strongswan.android", "refsource" : "CONFIRM", "url" : "https://play.google.com/store/apps/details?id=org.strongswan.android" }, { "name" : "https://www.strongswan.org/blog/2015/06/08/strongswan-vulnerability-%2528cve-2015-4171%2529.html", "refsource" : "CONFIRM", "url" : "https://www.strongswan.org/blog/2015/06/08/strongswan-vulnerability-%2528cve-2015-4171%2529.html" }, { "name" : "https://bugzilla.suse.com/show_bug.cgi?id=933591", "refsource" : "CONFIRM", "url" : "https://bugzilla.suse.com/show_bug.cgi?id=933591" }, { "name" : "https://www.suse.com/security/cve/CVE-2015-4171.html", "refsource" : "CONFIRM", "url" : "https://www.suse.com/security/cve/CVE-2015-4171.html" }, { "name" : "DSA-3282", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2015/dsa-3282" }, { "name" : "openSUSE-SU-2015:1082", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-updates/2015-06/msg00040.html" }, { "name" : "USN-2628-1", "refsource" : "UBUNTU", "url" : "http://www.ubuntu.com/usn/USN-2628-1" }, { "name" : "74933", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/74933" }, { "name" : "1032514", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id/1032514" } ] } }