In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Alpine | edge-main | noarch | strongswan | < 5.9.1-r4 | UNKNOWN |
Alpine | 3.13-main | noarch | strongswan | < 5.9.1-r2 | UNKNOWN |
Alpine | 3.14-main | noarch | strongswan | < 5.9.1-r3 | UNKNOWN |
Alpine | 3.15-main | noarch | strongswan | < 5.9.1-r4 | UNKNOWN |
Alpine | 3.16-main | noarch | strongswan | < 5.9.1-r4 | UNKNOWN |
Alpine | 3.17-main | noarch | strongswan | < 5.9.1-r4 | UNKNOWN |
Alpine | 3.18-main | noarch | strongswan | < 5.9.1-r4 | UNKNOWN |
Alpine | 3.19-main | noarch | strongswan | < 5.9.1-r4 | UNKNOWN |