Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <55758EF8.4090708@strongswan.org>
Date: Mon, 08 Jun 2015 14:47:52 +0200
From: Tobias Brunner <tobias@...ongswan.org>
To: "Alexander E. Patrakov" <patrakov@...il.com>
CC: oss-security@...ts.openwall.com
Subject: Re: StrongSwan VPN client for Android leaks username to rouge server

Hi Alexander,

> I found that, in the event of DNS spoofing, StrongSwan VPN client for 
> Android can leak the username and the MSCHAPv2 authentication value to a 
> rogue server if it has any valid X.509 certificate. Unless I 
> misunderstand something about X.509 certificates and their use for 
> confirming IKEv2 identities, and unless this is already known, this 
> might use a CVE ID.

Thanks for bringing this to our attention.  We've just released a fix
for this vulnerability [1], which has been registered as CVE-2015-4171.

An updated version of the Android app and strongSwan 5.3.2 that both
include the fix were also released [2].

Regards,
Tobias

[1] http://www.strongswan.org/blog/2015/06/08/strongswan-vulnerability-(cve-2015-4171).html
[2] http://www.strongswan.org/blog/2015/06/08/strongswan-5.3.2-released.html

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.