Description
The remote Debian 9 host has packages installed that are affected by a vulnerability as referenced in the dla-2909 advisory.
- In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. (CVE-2021-45079)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Related
{"id": "DEBIAN_DLA-2909.NASL", "vendorId": null, "type": "nessus", "bulletinFamily": "scanner", "title": "Debian DLA-2909-1 : strongswan - LTS security update", "description": "The remote Debian 9 host has packages installed that are affected by a vulnerability as referenced in the dla-2909 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "published": "2022-02-04T00:00:00", "modified": "2022-02-08T00:00:00", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}, "cvss2": {}, "cvss3": {"score": 9.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}, "href": "https://www.tenable.com/plugins/nessus/157379", "reporter": "This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://security-tracker.debian.org/tracker/CVE-2021-45079", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45079", "https://www.debian.org/lts/security/2022/dla-2909", "https://security-tracker.debian.org/tracker/source-package/strongswan", "https://packages.debian.org/source/stretch/strongswan"], "cvelist": ["CVE-2021-45079"], "immutableFields": [], "lastseen": "2022-06-15T16:55:34", "viewCount": 2, "enchantments": {"backreferences": {"references": [{"type": "alpinelinux", "idList": ["ALPINE:CVE-2021-45079"]}, {"type": "cve", "idList": ["CVE-2021-45079"]}, {"type": "debian", "idList": ["DEBIAN:DSA-5056-1:87B5F"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2021-45079"]}, {"type": "fedora", "idList": ["FEDORA:ACD053081CE4", "FEDORA:D3F8830A9F1A"]}, {"type": "freebsd", "idList": ["CCAEA96B-7DCD-11EC-93DF-00224D821998"]}, {"type": "nessus", "idList": ["DEBIAN_DSA-5056.NASL", "FREEBSD_PKG_CCAEA96B7DCD11EC93DF00224D821998.NASL", "SUSE_SU-2022-0202-1.NASL", "SUSE_SU-2022-0211-1.NASL", "SUSE_SU-2022-0492-1.NASL", "SUSE_SU-2022-14887-1.NASL", "UBUNTU_USN-5250-1.NASL", "UBUNTU_USN-5250-2.NASL"]}, {"type": "photon", "idList": ["PHSA-2022-0152", "PHSA-2022-0361", "PHSA-2022-0439", "PHSA-2022-0468"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2022:0492-1"]}, {"type": "ubuntu", "idList": ["USN-5250-1", "USN-5250-2"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2021-45079"]}]}, "score": {"value": 5.6, "vector": "NONE"}, "dependencies": {"references": [{"type": "alpinelinux", "idList": ["ALPINE:CVE-2021-45079"]}, {"type": "cve", "idList": ["CVE-2021-45079"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2909-1:F4017", "DEBIAN:DSA-5056-1:87B5F"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2021-45079"]}, {"type": "fedora", "idList": ["FEDORA:ACD053081CE4", "FEDORA:D3F8830A9F1A"]}, {"type": "freebsd", "idList": ["CCAEA96B-7DCD-11EC-93DF-00224D821998"]}, {"type": "nessus", "idList": ["DEBIAN_DSA-5056.NASL", "FREEBSD_PKG_CCAEA96B7DCD11EC93DF00224D821998.NASL", "OPENSUSE-2022-0492-1.NASL", "SUSE_SU-2022-0202-1.NASL", "SUSE_SU-2022-0211-1.NASL", "SUSE_SU-2022-0492-1.NASL", "SUSE_SU-2022-14887-1.NASL", "UBUNTU_USN-5250-1.NASL", "UBUNTU_USN-5250-2.NASL"]}, {"type": "photon", "idList": ["PHSA-2022-0152", "PHSA-2022-0361", "PHSA-2022-0439", "PHSA-2022-0468"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2022:0492-1"]}, {"type": "ubuntu", "idList": ["USN-5250-1", "USN-5250-2"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2021-45079"]}], "rev": 4}, "exploitation": null, "vulnersScore": 5.6}, "_state": {"dependencies": 0, "score": 0}, "_internal": {}, "pluginID": "157379", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory dla-2909. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(157379);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/02/08\");\n\n script_cve_id(\"CVE-2021-45079\");\n\n script_name(english:\"Debian DLA-2909-1 : strongswan - LTS security update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Debian host is missing a security-related update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Debian 9 host has packages installed that are affected by a vulnerability as referenced in the dla-2909\nadvisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without\n actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only\n authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/source-package/strongswan\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.debian.org/lts/security/2022/dla-2909\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-45079\");\n script_set_attribute(attribute:\"see_also\", value:\"https://packages.debian.org/source/stretch/strongswan\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the strongswan packages.\n\nFor Debian 9 stretch, this problem has been fixed in version 5.5.1-4+deb9u6.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-45079\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/01/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/02/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/02/04\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:charon-cmd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:charon-systemd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libcharon-extra-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libstrongswan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libstrongswan-extra-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libstrongswan-standard-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-charon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-ike\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-ikev1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-ikev2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-libcharon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-nm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-pki\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-scepclient\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-starter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-swanctl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Debian Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('debian_package.inc');\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar release = get_kb_item('Host/Debian/release');\nif ( isnull(release) ) audit(AUDIT_OS_NOT, 'Debian');\nvar release = chomp(release);\nif (! preg(pattern:\"^(9)\\.[0-9]+\", string:release)) audit(AUDIT_OS_NOT, 'Debian 9.0', 'Debian ' + release);\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Debian', cpu);\n\nvar pkgs = [\n {'release': '9.0', 'prefix': 'charon-cmd', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'charon-systemd', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'libcharon-extra-plugins', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'libstrongswan', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'libstrongswan-extra-plugins', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'libstrongswan-standard-plugins', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'strongswan', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'strongswan-charon', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'strongswan-ike', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'strongswan-ikev1', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'strongswan-ikev2', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'strongswan-libcharon', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'strongswan-nm', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'strongswan-pki', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'strongswan-scepclient', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'strongswan-starter', 'reference': '5.5.1-4+deb9u6'},\n {'release': '9.0', 'prefix': 'strongswan-swanctl', 'reference': '5.5.1-4+deb9u6'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var release = NULL;\n var prefix = NULL;\n var reference = NULL;\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['prefix'])) prefix = package_array['prefix'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (release && prefix && reference) {\n if (deb_check(release:release, prefix:prefix, reference:reference)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : deb_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = deb_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'charon-cmd / charon-systemd / libcharon-extra-plugins / libstrongswan / etc');\n}\n", "naslFamily": "Debian Local Security Checks", "cpe": ["p-cpe:/a:debian:debian_linux:charon-cmd", "p-cpe:/a:debian:debian_linux:charon-systemd", "p-cpe:/a:debian:debian_linux:libcharon-extra-plugins", "p-cpe:/a:debian:debian_linux:libstrongswan", "p-cpe:/a:debian:debian_linux:libstrongswan-extra-plugins", "p-cpe:/a:debian:debian_linux:libstrongswan-standard-plugins", "p-cpe:/a:debian:debian_linux:strongswan", "p-cpe:/a:debian:debian_linux:strongswan-charon", "p-cpe:/a:debian:debian_linux:strongswan-ike", "p-cpe:/a:debian:debian_linux:strongswan-ikev1", "p-cpe:/a:debian:debian_linux:strongswan-ikev2", "p-cpe:/a:debian:debian_linux:strongswan-libcharon", "p-cpe:/a:debian:debian_linux:strongswan-nm", "p-cpe:/a:debian:debian_linux:strongswan-pki", "p-cpe:/a:debian:debian_linux:strongswan-scepclient", "p-cpe:/a:debian:debian_linux:strongswan-starter", "p-cpe:/a:debian:debian_linux:strongswan-swanctl", "cpe:/o:debian:debian_linux:9.0"], "solution": "Upgrade the strongswan packages.\n\nFor Debian 9 stretch, this problem has been fixed in version 5.5.1-4+deb9u6.", "nessusSeverity": "Medium", "cvssScoreSource": "CVE-2021-45079", "vpr": {"risk factor": "Medium", "score": "6"}, "exploitAvailable": false, "exploitEase": "No known exploits are available", "patchPublicationDate": "2022-02-04T00:00:00", "vulnerabilityPublicationDate": "2022-01-25T00:00:00", "exploitableWith": []}
{"nessus": [{"lastseen": "2022-06-15T18:15:39", "description": "The remote Debian 10 / 11 host has packages installed that are affected by a vulnerability as referenced in the dsa-5056 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}, "published": "2022-01-31T00:00:00", "type": "nessus", "title": "Debian DSA-5056-1 : strongswan - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-45079"], "modified": "2022-02-08T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:charon-cmd", "p-cpe:/a:debian:debian_linux:charon-systemd", "p-cpe:/a:debian:debian_linux:libcharon-extauth-plugins", "p-cpe:/a:debian:debian_linux:libcharon-extra-plugins", "p-cpe:/a:debian:debian_linux:libstrongswan", "p-cpe:/a:debian:debian_linux:libstrongswan-extra-plugins", "p-cpe:/a:debian:debian_linux:libstrongswan-standard-plugins", "p-cpe:/a:debian:debian_linux:strongswan", "p-cpe:/a:debian:debian_linux:strongswan-charon", "p-cpe:/a:debian:debian_linux:strongswan-libcharon", "p-cpe:/a:debian:debian_linux:strongswan-nm", "p-cpe:/a:debian:debian_linux:strongswan-pki", "p-cpe:/a:debian:debian_linux:strongswan-scepclient", "p-cpe:/a:debian:debian_linux:strongswan-starter", "p-cpe:/a:debian:debian_linux:strongswan-swanctl", "cpe:/o:debian:debian_linux:10.0", "cpe:/o:debian:debian_linux:11.0"], "id": "DEBIAN_DSA-5056.NASL", "href": "https://www.tenable.com/plugins/nessus/157253", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory dsa-5056. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(157253);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/02/08\");\n\n script_cve_id(\"CVE-2021-45079\");\n\n script_name(english:\"Debian DSA-5056-1 : strongswan - security update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Debian host is missing a security-related update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Debian 10 / 11 host has packages installed that are affected by a vulnerability as referenced in the dsa-5056\nadvisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without\n actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only\n authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/source-package/strongswan\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.debian.org/security/2022/dsa-5056\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-45079\");\n script_set_attribute(attribute:\"see_also\", value:\"https://packages.debian.org/source/buster/strongswan\");\n script_set_attribute(attribute:\"see_also\", value:\"https://packages.debian.org/source/bullseye/strongswan\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the strongswan packages.\n\nFor the stable distribution (bullseye), this problem has been fixed in version 5.9.1-1+deb11u2.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-45079\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/01/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/01/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/01/31\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:charon-cmd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:charon-systemd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libcharon-extauth-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libcharon-extra-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libstrongswan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libstrongswan-extra-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libstrongswan-standard-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-charon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-libcharon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-nm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-pki\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-scepclient\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-starter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:strongswan-swanctl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:10.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:11.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Debian Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('debian_package.inc');\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar release = get_kb_item('Host/Debian/release');\nif ( isnull(release) ) audit(AUDIT_OS_NOT, 'Debian');\nvar release = chomp(release);\nif (! preg(pattern:\"^(10)\\.[0-9]+|^(11)\\.[0-9]+\", string:release)) audit(AUDIT_OS_NOT, 'Debian 10.0 / 11.0', 'Debian ' + release);\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Debian', cpu);\n\nvar pkgs = [\n {'release': '10.0', 'prefix': 'charon-cmd', 'reference': '5.7.2-1+deb10u2'},\n {'release': '10.0', 'prefix': 'charon-systemd', 'reference': '5.7.2-1+deb10u2'},\n {'release': '10.0', 'prefix': 'libcharon-extauth-plugins', 'reference': '5.7.2-1+deb10u2'},\n {'release': '10.0', 'prefix': 'libcharon-extra-plugins', 'reference': '5.7.2-1+deb10u2'},\n {'release': '10.0', 'prefix': 'libstrongswan', 'reference': '5.7.2-1+deb10u2'},\n {'release': '10.0', 'prefix': 'libstrongswan-extra-plugins', 'reference': '5.7.2-1+deb10u2'},\n {'release': '10.0', 'prefix': 'libstrongswan-standard-plugins', 'reference': '5.7.2-1+deb10u2'},\n {'release': '10.0', 'prefix': 'strongswan', 'reference': '5.7.2-1+deb10u2'},\n {'release': '10.0', 'prefix': 'strongswan-charon', 'reference': '5.7.2-1+deb10u2'},\n {'release': '10.0', 'prefix': 'strongswan-libcharon', 'reference': '5.7.2-1+deb10u2'},\n {'release': '10.0', 'prefix': 'strongswan-nm', 'reference': '5.7.2-1+deb10u2'},\n {'release': '10.0', 'prefix': 'strongswan-pki', 'reference': '5.7.2-1+deb10u2'},\n {'release': '10.0', 'prefix': 'strongswan-scepclient', 'reference': '5.7.2-1+deb10u2'},\n {'release': '10.0', 'prefix': 'strongswan-starter', 'reference': '5.7.2-1+deb10u2'},\n {'release': '10.0', 'prefix': 'strongswan-swanctl', 'reference': '5.7.2-1+deb10u2'},\n {'release': '11.0', 'prefix': 'charon-cmd', 'reference': '5.9.1-1+deb11u2'},\n {'release': '11.0', 'prefix': 'charon-systemd', 'reference': '5.9.1-1+deb11u2'},\n {'release': '11.0', 'prefix': 'libcharon-extauth-plugins', 'reference': '5.9.1-1+deb11u2'},\n {'release': '11.0', 'prefix': 'libcharon-extra-plugins', 'reference': '5.9.1-1+deb11u2'},\n {'release': '11.0', 'prefix': 'libstrongswan', 'reference': '5.9.1-1+deb11u2'},\n {'release': '11.0', 'prefix': 'libstrongswan-extra-plugins', 'reference': '5.9.1-1+deb11u2'},\n {'release': '11.0', 'prefix': 'libstrongswan-standard-plugins', 'reference': '5.9.1-1+deb11u2'},\n {'release': '11.0', 'prefix': 'strongswan', 'reference': '5.9.1-1+deb11u2'},\n {'release': '11.0', 'prefix': 'strongswan-charon', 'reference': '5.9.1-1+deb11u2'},\n {'release': '11.0', 'prefix': 'strongswan-libcharon', 'reference': '5.9.1-1+deb11u2'},\n {'release': '11.0', 'prefix': 'strongswan-nm', 'reference': '5.9.1-1+deb11u2'},\n {'release': '11.0', 'prefix': 'strongswan-pki', 'reference': '5.9.1-1+deb11u2'},\n {'release': '11.0', 'prefix': 'strongswan-scepclient', 'reference': '5.9.1-1+deb11u2'},\n {'release': '11.0', 'prefix': 'strongswan-starter', 'reference': '5.9.1-1+deb11u2'},\n {'release': '11.0', 'prefix': 'strongswan-swanctl', 'reference': '5.9.1-1+deb11u2'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var release = NULL;\n var prefix = NULL;\n var reference = NULL;\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['prefix'])) prefix = package_array['prefix'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (release && prefix && reference) {\n if (deb_check(release:release, prefix:prefix, reference:reference)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : deb_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = deb_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'charon-cmd / charon-systemd / libcharon-extauth-plugins / etc');\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2022-06-15T16:58:00", "description": "The remote SUSE Linux SLED15 / SLES15 host has packages installed that are affected by a vulnerability as referenced in the SUSE-SU-2022:0492-1 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}, "published": "2022-02-19T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : strongswan (SUSE-SU-2022:0492-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-45079"], "modified": "2022-02-19T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:strongswan", "p-cpe:/a:novell:suse_linux:strongswan-doc", "p-cpe:/a:novell:suse_linux:strongswan-hmac", "p-cpe:/a:novell:suse_linux:strongswan-ipsec", "p-cpe:/a:novell:suse_linux:strongswan-libs0", "p-cpe:/a:novell:suse_linux:strongswan-nm", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2022-0492-1.NASL", "href": "https://www.tenable.com/plugins/nessus/158185", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# SUSE update advisory SUSE-SU-2022:0492-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(158185);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/02/19\");\n\n script_cve_id(\"CVE-2021-45079\");\n script_xref(name:\"SuSE\", value:\"SUSE-SU-2022:0492-1\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : strongswan (SUSE-SU-2022:0492-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote SUSE Linux SLED15 / SLES15 host has packages installed that are affected by a vulnerability as referenced in\nthe SUSE-SU-2022:0492-1 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without\n actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only\n authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1194471\");\n # https://lists.suse.com/pipermail/sle-security-updates/2022-February/010267.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e07a3a13\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-45079\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-45079\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/01/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/02/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/02/19\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan-hmac\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan-ipsec\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan-libs0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan-nm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar release = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nvar os_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLED15 / SLES15', 'SUSE ' + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE ' + os_ver, cpu);\n\nvar sp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(3|4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP3/4\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(2|3|4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP2/3/4\", os_ver + \" SP\" + sp);\n\nvar pkgs = [\n {'reference':'strongswan-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15.2'},\n {'reference':'strongswan-doc-5.8.2-11.24.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15.2'},\n {'reference':'strongswan-hmac-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15.2'},\n {'reference':'strongswan-ipsec-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15.2'},\n {'reference':'strongswan-libs0-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15.2'},\n {'reference':'strongswan-5.8.2-11.24.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-2'},\n {'reference':'strongswan-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-2'},\n {'reference':'strongswan-doc-5.8.2-11.24.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-2'},\n {'reference':'strongswan-hmac-5.8.2-11.24.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-2'},\n {'reference':'strongswan-hmac-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-2'},\n {'reference':'strongswan-ipsec-5.8.2-11.24.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-2'},\n {'reference':'strongswan-ipsec-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-2'},\n {'reference':'strongswan-libs0-5.8.2-11.24.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-2'},\n {'reference':'strongswan-libs0-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-2'},\n {'reference':'strongswan-5.8.2-11.24.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.2'},\n {'reference':'strongswan-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.2'},\n {'reference':'strongswan-doc-5.8.2-11.24.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.2'},\n {'reference':'strongswan-hmac-5.8.2-11.24.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.2'},\n {'reference':'strongswan-hmac-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.2'},\n {'reference':'strongswan-ipsec-5.8.2-11.24.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.2'},\n {'reference':'strongswan-ipsec-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.2'},\n {'reference':'strongswan-libs0-5.8.2-11.24.1', 'sp':'2', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.2'},\n {'reference':'strongswan-libs0-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.2'},\n {'reference':'strongswan-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_RT-release-15.2'},\n {'reference':'strongswan-doc-5.8.2-11.24.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_RT-release-15.2'},\n {'reference':'strongswan-hmac-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_RT-release-15.2'},\n {'reference':'strongswan-ipsec-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_RT-release-15.2'},\n {'reference':'strongswan-libs0-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_RT-release-15.2'},\n {'reference':'strongswan-5.8.2-11.24.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.3'},\n {'reference':'strongswan-5.8.2-11.24.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.3'},\n {'reference':'strongswan-doc-5.8.2-11.24.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.3'},\n {'reference':'strongswan-doc-5.8.2-11.24.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.3'},\n {'reference':'strongswan-hmac-5.8.2-11.24.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.3'},\n {'reference':'strongswan-hmac-5.8.2-11.24.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.3'},\n {'reference':'strongswan-ipsec-5.8.2-11.24.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.3'},\n {'reference':'strongswan-ipsec-5.8.2-11.24.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.3'},\n {'reference':'strongswan-libs0-5.8.2-11.24.1', 'sp':'3', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.3'},\n {'reference':'strongswan-libs0-5.8.2-11.24.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.3'},\n {'reference':'strongswan-5.8.2-11.24.1', 'sp':'4', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.4'},\n {'reference':'strongswan-5.8.2-11.24.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.4'},\n {'reference':'strongswan-doc-5.8.2-11.24.1', 'sp':'4', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.4'},\n {'reference':'strongswan-doc-5.8.2-11.24.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.4'},\n {'reference':'strongswan-hmac-5.8.2-11.24.1', 'sp':'4', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.4'},\n {'reference':'strongswan-hmac-5.8.2-11.24.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.4'},\n {'reference':'strongswan-ipsec-5.8.2-11.24.1', 'sp':'4', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.4'},\n {'reference':'strongswan-ipsec-5.8.2-11.24.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.4'},\n {'reference':'strongswan-libs0-5.8.2-11.24.1', 'sp':'4', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.4'},\n {'reference':'strongswan-libs0-5.8.2-11.24.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-basesystem-release-15.4'},\n {'reference':'strongswan-nm-5.8.2-11.24.1', 'sp':'3', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-packagehub-subpackages-release-15.3'},\n {'reference':'strongswan-nm-5.8.2-11.24.1', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-module-packagehub-subpackages-release-15.4'},\n {'reference':'strongswan-nm-5.8.2-11.24.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.3'},\n {'reference':'strongswan-nm-5.8.2-11.24.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.3'},\n {'reference':'strongswan-nm-5.8.2-11.24.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.4'},\n {'reference':'strongswan-nm-5.8.2-11.24.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sle-we-release-15.4'},\n {'reference':'strongswan-5.8.2-11.24.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15.2'},\n {'reference':'strongswan-doc-5.8.2-11.24.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15.2'},\n {'reference':'strongswan-hmac-5.8.2-11.24.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15.2'},\n {'reference':'strongswan-ipsec-5.8.2-11.24.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15.2'},\n {'reference':'strongswan-libs0-5.8.2-11.24.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15.2'},\n {'reference':'strongswan-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-15.2'},\n {'reference':'strongswan-doc-5.8.2-11.24.1', 'sp':'2', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-15.2'},\n {'reference':'strongswan-hmac-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-15.2'},\n {'reference':'strongswan-ipsec-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-15.2'},\n {'reference':'strongswan-libs0-5.8.2-11.24.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-15.2'}\n];\n\nvar ltss_caveat_required = FALSE;\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var exists_check = NULL;\n var rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && release) {\n if (exists_check) {\n if (!rpm_exists(release:release, rpm:exists_check)) continue;\n if ('ltss' >< tolower(exists_check)) ltss_caveat_required = TRUE;\n }\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n var ltss_plugin_caveat = NULL;\n if(ltss_caveat_required) ltss_plugin_caveat = '\\n' +\n 'NOTE: This vulnerability check contains fixes that apply to\\n' +\n 'packages only available in SUSE Enterprise Linux Server LTSS\\n' +\n 'repositories. Access to these package security updates require\\n' +\n 'a paid SUSE LTSS subscription.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + ltss_plugin_caveat\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'strongswan / strongswan-doc / strongswan-hmac / strongswan-ipsec / etc');\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2022-06-15T16:57:22", "description": "The remote SUSE Linux SUSE15 host has packages installed that are affected by a vulnerability as referenced in the openSUSE-SU-2022:0492-1 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}, "published": "2022-02-22T00:00:00", "type": "nessus", "title": "openSUSE 15 Security Update : strongswan (openSUSE-SU-2022:0492-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-45079"], "modified": "2022-02-22T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:strongswan", "p-cpe:/a:novell:opensuse:strongswan-hmac", "p-cpe:/a:novell:opensuse:strongswan-ipsec", "p-cpe:/a:novell:opensuse:strongswan-libs0", "p-cpe:/a:novell:opensuse:strongswan-mysql", "p-cpe:/a:novell:opensuse:strongswan-nm", "p-cpe:/a:novell:opensuse:strongswan-sqlite", "cpe:/o:novell:opensuse:15.3"], "id": "OPENSUSE-2022-0492-1.NASL", "href": "https://www.tenable.com/plugins/nessus/158223", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# openSUSE Security Update openSUSE-SU-2022:0492-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(158223);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/02/22\");\n\n script_cve_id(\"CVE-2021-45079\");\n\n script_name(english:\"openSUSE 15 Security Update : strongswan (openSUSE-SU-2022:0492-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote SUSE Linux SUSE15 host has packages installed that are affected by a vulnerability as referenced in the\nopenSUSE-SU-2022:0492-1 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without\n actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only\n authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1194471\");\n # https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDDGV75VWTCAFSBICC2NAFQ3EN5G6NAI/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?237d5f26\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-45079\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-45079\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/01/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/02/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/02/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:strongswan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:strongswan-hmac\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:strongswan-ipsec\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:strongswan-libs0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:strongswan-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:strongswan-nm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:strongswan-sqlite\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.3\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar release = get_kb_item('Host/SuSE/release');\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, 'openSUSE');\nvar os_ver = pregmatch(pattern: \"^SUSE([\\d.]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'openSUSE');\nos_ver = os_ver[1];\nif (release !~ \"^(SUSE15\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, 'openSUSE', '15.3', release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'openSUSE ' + os_ver, cpu);\n\nvar pkgs = [\n {'reference':'strongswan-5.8.2-11.24.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'strongswan-hmac-5.8.2-11.24.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'strongswan-ipsec-5.8.2-11.24.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'strongswan-libs0-5.8.2-11.24.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'strongswan-mysql-5.8.2-11.24.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'strongswan-nm-5.8.2-11.24.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'strongswan-sqlite-5.8.2-11.24.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var cpu = NULL;\n var rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && release) {\n if (rpm_check(release:release, cpu:cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'strongswan / strongswan-hmac / strongswan-ipsec / strongswan-libs0 / etc');\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2022-06-15T18:17:01", "description": "The remote Ubuntu 18.04 LTS / 20.04 LTS / 21.10 host has packages installed that are affected by a vulnerability as referenced in the USN-5250-1 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}, "published": "2022-01-25T00:00:00", "type": "nessus", "title": "Ubuntu 18.04 LTS / 20.04 LTS / 21.10 : strongSwan vulnerability (USN-5250-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-45079"], "modified": "2022-02-08T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "cpe:/o:canonical:ubuntu_linux:20.04:-:lts", "cpe:/o:canonical:ubuntu_linux:21.10", "p-cpe:/a:canonical:ubuntu_linux:charon-cmd", "p-cpe:/a:canonical:ubuntu_linux:charon-systemd", "p-cpe:/a:canonical:ubuntu_linux:libcharon-extauth-plugins", "p-cpe:/a:canonical:ubuntu_linux:libcharon-extra-plugins", "p-cpe:/a:canonical:ubuntu_linux:libcharon-standard-plugins", "p-cpe:/a:canonical:ubuntu_linux:libstrongswan", "p-cpe:/a:canonical:ubuntu_linux:libstrongswan-extra-plugins", "p-cpe:/a:canonical:ubuntu_linux:libstrongswan-standard-plugins", "p-cpe:/a:canonical:ubuntu_linux:strongswan", "p-cpe:/a:canonical:ubuntu_linux:strongswan-charon", "p-cpe:/a:canonical:ubuntu_linux:strongswan-libcharon", "p-cpe:/a:canonical:ubuntu_linux:strongswan-nm", "p-cpe:/a:canonical:ubuntu_linux:strongswan-pki", "p-cpe:/a:canonical:ubuntu_linux:strongswan-scepclient", "p-cpe:/a:canonical:ubuntu_linux:strongswan-starter", "p-cpe:/a:canonical:ubuntu_linux:strongswan-swanctl", "p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-base", "p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-client", "p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-ifmap", "p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-pdp", "p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-server"], "id": "UBUNTU_USN-5250-1.NASL", "href": "https://www.tenable.com/plugins/nessus/157057", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-5250-1. The text\n# itself is copyright (C) Canonical, Inc. See\n# <https://ubuntu.com/security/notices>. Ubuntu(R) is a registered\n# trademark of Canonical, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(157057);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/02/08\");\n\n script_cve_id(\"CVE-2021-45079\");\n script_xref(name:\"USN\", value:\"5250-1\");\n\n script_name(english:\"Ubuntu 18.04 LTS / 20.04 LTS / 21.10 : strongSwan vulnerability (USN-5250-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Ubuntu 18.04 LTS / 20.04 LTS / 21.10 host has packages installed that are affected by a vulnerability as\nreferenced in the USN-5250-1 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without\n actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only\n authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-5250-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-45079\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/01/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/01/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/01/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:20.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:21.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:charon-cmd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:charon-systemd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libcharon-extauth-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libcharon-extra-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libcharon-standard-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libstrongswan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libstrongswan-extra-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libstrongswan-standard-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-charon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-libcharon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-nm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-pki\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-scepclient\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-starter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-swanctl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-ifmap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-pdp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-server\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2022 Canonical, Inc. / NASL script (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('ubuntu.inc');\ninclude('misc_func.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nvar release = chomp(release);\nif (! preg(pattern:\"^(18\\.04|20\\.04|21\\.10)$\", string:release)) audit(AUDIT_OS_NOT, 'Ubuntu 18.04 / 20.04 / 21.10', 'Ubuntu ' + release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\n\nvar pkgs = [\n {'osver': '18.04', 'pkgname': 'charon-cmd', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'charon-systemd', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'libcharon-extra-plugins', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'libcharon-standard-plugins', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'libstrongswan', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'libstrongswan-extra-plugins', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'libstrongswan-standard-plugins', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'strongswan', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'strongswan-charon', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'strongswan-libcharon', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'strongswan-nm', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'strongswan-pki', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'strongswan-scepclient', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'strongswan-starter', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'strongswan-swanctl', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'strongswan-tnc-base', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'strongswan-tnc-client', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'strongswan-tnc-ifmap', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'strongswan-tnc-pdp', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '18.04', 'pkgname': 'strongswan-tnc-server', 'pkgver': '5.6.2-1ubuntu2.8'},\n {'osver': '20.04', 'pkgname': 'charon-cmd', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'charon-systemd', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'libcharon-extauth-plugins', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'libcharon-extra-plugins', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'libcharon-standard-plugins', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'libstrongswan', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'libstrongswan-extra-plugins', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'libstrongswan-standard-plugins', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'strongswan', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'strongswan-charon', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'strongswan-libcharon', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'strongswan-nm', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'strongswan-pki', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'strongswan-scepclient', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'strongswan-starter', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'strongswan-swanctl', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'strongswan-tnc-base', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'strongswan-tnc-client', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'strongswan-tnc-ifmap', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'strongswan-tnc-pdp', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '20.04', 'pkgname': 'strongswan-tnc-server', 'pkgver': '5.8.2-1ubuntu3.4'},\n {'osver': '21.10', 'pkgname': 'charon-cmd', 'pkgver': '5.9.1-1ubuntu3.2'},\n {'osver': '21.10', 'pkgname': 'charon-systemd', 'pkgver': '5.9.1-1ubuntu3.2'},\n {'osver': '21.10', 'pkgname': 'libcharon-extauth-plugins', 'pkgver': '5.9.1-1ubuntu3.2'},\n {'osver': '21.10', 'pkgname': 'libcharon-extra-plugins', 'pkgver': '5.9.1-1ubuntu3.2'},\n {'osver': '21.10', 'pkgname': 'libstrongswan', 'pkgver': '5.9.1-1ubuntu3.2'},\n {'osver': '21.10', 'pkgname': 'libstrongswan-extra-plugins', 'pkgver': '5.9.1-1ubuntu3.2'},\n {'osver': '21.10', 'pkgname': 'libstrongswan-standard-plugins', 'pkgver': '5.9.1-1ubuntu3.2'},\n {'osver': '21.10', 'pkgname': 'strongswan', 'pkgver': '5.9.1-1ubuntu3.2'},\n {'osver': '21.10', 'pkgname': 'strongswan-charon', 'pkgver': '5.9.1-1ubuntu3.2'},\n {'osver': '21.10', 'pkgname': 'strongswan-libcharon', 'pkgver': '5.9.1-1ubuntu3.2'},\n {'osver': '21.10', 'pkgname': 'strongswan-nm', 'pkgver': '5.9.1-1ubuntu3.2'},\n {'osver': '21.10', 'pkgname': 'strongswan-pki', 'pkgver': '5.9.1-1ubuntu3.2'},\n {'osver': '21.10', 'pkgname': 'strongswan-scepclient', 'pkgver': '5.9.1-1ubuntu3.2'},\n {'osver': '21.10', 'pkgname': 'strongswan-starter', 'pkgver': '5.9.1-1ubuntu3.2'},\n {'osver': '21.10', 'pkgname': 'strongswan-swanctl', 'pkgver': '5.9.1-1ubuntu3.2'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var osver = NULL;\n var pkgname = NULL;\n var pkgver = NULL;\n if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];\n if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];\n if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];\n if (osver && pkgname && pkgver) {\n if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'charon-cmd / charon-systemd / libcharon-extauth-plugins / etc');\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2022-06-15T22:22:15", "description": "The remote Ubuntu 16.04 LTS host has packages installed that are affected by a vulnerability as referenced in the USN-5250-2 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}, "published": "2022-01-25T00:00:00", "type": "nessus", "title": "Ubuntu 16.04 LTS : strongSwan vulnerability (USN-5250-2)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-45079"], "modified": "2022-02-08T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:16.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:charon-cmd", "p-cpe:/a:canonical:ubuntu_linux:libcharon-extra-plugins", "p-cpe:/a:canonical:ubuntu_linux:libstrongswan", "p-cpe:/a:canonical:ubuntu_linux:libstrongswan-extra-plugins", "p-cpe:/a:canonical:ubuntu_linux:libstrongswan-standard-plugins", "p-cpe:/a:canonical:ubuntu_linux:strongswan", "p-cpe:/a:canonical:ubuntu_linux:strongswan-charon", "p-cpe:/a:canonical:ubuntu_linux:strongswan-ike", "p-cpe:/a:canonical:ubuntu_linux:strongswan-ikev1", "p-cpe:/a:canonical:ubuntu_linux:strongswan-ikev2", "p-cpe:/a:canonical:ubuntu_linux:strongswan-libcharon", "p-cpe:/a:canonical:ubuntu_linux:strongswan-nm", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-af-alg", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-agent", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-attr-sql", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-certexpire", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-coupling", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-curl", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-dhcp", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-dnscert", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-dnskey", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-duplicheck", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-aka", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-aka-3gpp2", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-dynamic", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-gtc", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-md5", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-mschapv2", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-peap", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-radius", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-sim", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-sim-file", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-sim-pcsc", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-simaka-pseudonym", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-simaka-reauth", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-simaka-sql", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-tls", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-tnc", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-ttls", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-error-notify", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-farp", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-fips-prf", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-gcrypt", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-gmp", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-ipseckey", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-kernel-libipsec", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-ldap", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-led", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-load-tester", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-lookip", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-mysql", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-ntru", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-openssl", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-pgp", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-pkcs11", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-pubkey", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-radattr", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-soup", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-sql", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-sqlite", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-sshkey", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-systime-fix", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-unbound", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-unity", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-whitelist", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-xauth-eap", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-xauth-generic", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-xauth-noauth", "p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-xauth-pam", "p-cpe:/a:canonical:ubuntu_linux:strongswan-pt-tls-client", "p-cpe:/a:canonical:ubuntu_linux:strongswan-starter", "p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-base", "p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-client", "p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-ifmap", "p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-pdp", "p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-server"], "id": "UBUNTU_USN-5250-2.NASL", "href": "https://www.tenable.com/plugins/nessus/157059", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-5250-2. The text\n# itself is copyright (C) Canonical, Inc. See\n# <https://ubuntu.com/security/notices>. Ubuntu(R) is a registered\n# trademark of Canonical, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(157059);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/02/08\");\n\n script_cve_id(\"CVE-2021-45079\");\n script_xref(name:\"USN\", value:\"5250-2\");\n\n script_name(english:\"Ubuntu 16.04 LTS : strongSwan vulnerability (USN-5250-2)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Ubuntu 16.04 LTS host has packages installed that are affected by a vulnerability as referenced in the\nUSN-5250-2 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without\n actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only\n authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-5250-2\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-45079\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/01/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/01/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/01/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:charon-cmd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libcharon-extra-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libstrongswan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libstrongswan-extra-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libstrongswan-standard-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-charon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-ike\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-ikev1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-ikev2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-libcharon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-nm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-af-alg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-agent\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-attr-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-certexpire\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-coupling\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-curl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-dhcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-dnscert\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-dnskey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-duplicheck\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-aka\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-aka-3gpp2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-dynamic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-gtc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-md5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-mschapv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-peap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-radius\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-sim\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-sim-file\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-sim-pcsc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-simaka-pseudonym\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-simaka-reauth\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-simaka-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-tls\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-tnc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-eap-ttls\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-error-notify\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-farp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-fips-prf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-gcrypt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-gmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-ipseckey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-kernel-libipsec\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-led\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-load-tester\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-lookip\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-ntru\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-openssl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-pgp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-pkcs11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-pubkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-radattr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-soup\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-sql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-sqlite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-sshkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-systime-fix\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-unbound\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-unity\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-whitelist\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-xauth-eap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-xauth-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-xauth-noauth\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-plugin-xauth-pam\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-pt-tls-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-starter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-ifmap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-pdp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:strongswan-tnc-server\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2022 Canonical, Inc. / NASL script (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('ubuntu.inc');\ninclude('misc_func.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nvar release = chomp(release);\nif (! preg(pattern:\"^(16\\.04)$\", string:release)) audit(AUDIT_OS_NOT, 'Ubuntu 16.04', 'Ubuntu ' + release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\n\nvar pkgs = [\n {'osver': '16.04', 'pkgname': 'charon-cmd', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'libcharon-extra-plugins', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'libstrongswan', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'libstrongswan-extra-plugins', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'libstrongswan-standard-plugins', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-charon', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-ike', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-ikev1', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-ikev2', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-libcharon', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-nm', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-af-alg', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-agent', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-attr-sql', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-certexpire', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-coupling', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-curl', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-dhcp', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-dnscert', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-dnskey', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-duplicheck', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-aka', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-aka-3gpp2', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-dynamic', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-gtc', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-md5', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-mschapv2', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-peap', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-radius', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-sim', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-sim-file', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-sim-pcsc', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-simaka-pseudonym', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-simaka-reauth', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-simaka-sql', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-tls', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-tnc', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-eap-ttls', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-error-notify', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-farp', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-fips-prf', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-gcrypt', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-gmp', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-ipseckey', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-kernel-libipsec', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-ldap', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-led', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-load-tester', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-lookip', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-mysql', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-ntru', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-openssl', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-pgp', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-pkcs11', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-pubkey', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-radattr', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-soup', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-sql', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-sqlite', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-sshkey', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-systime-fix', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-unbound', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-unity', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-whitelist', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-xauth-eap', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-xauth-generic', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-xauth-noauth', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-plugin-xauth-pam', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-starter', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-tnc-base', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-tnc-client', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-tnc-ifmap', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-tnc-pdp', 'pkgver': '5.3.5-1ubuntu3.8+esm2'},\n {'osver': '16.04', 'pkgname': 'strongswan-tnc-server', 'pkgver': '5.3.5-1ubuntu3.8+esm2'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var osver = NULL;\n var pkgname = NULL;\n var pkgver = NULL;\n if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];\n if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];\n if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];\n if (osver && pkgname && pkgver) {\n if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'charon-cmd / libcharon-extra-plugins / libstrongswan / etc');\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2022-06-15T20:31:25", "description": "The remote SUSE Linux SLES15 host has packages installed that are affected by a vulnerability as referenced in the SUSE- SU-2022:0211-1 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}, "published": "2022-01-28T00:00:00", "type": "nessus", "title": "SUSE SLES15 Security Update : strongswan (SUSE-SU-2022:0211-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-45079"], "modified": "2022-02-08T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:strongswan", "p-cpe:/a:novell:suse_linux:strongswan-doc", "p-cpe:/a:novell:suse_linux:strongswan-hmac", "p-cpe:/a:novell:suse_linux:strongswan-ipsec", "p-cpe:/a:novell:suse_linux:strongswan-libs0", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2022-0211-1.NASL", "href": "https://www.tenable.com/plugins/nessus/157180", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# SUSE update advisory SUSE-SU-2022:0211-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(157180);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/02/08\");\n\n script_cve_id(\"CVE-2021-45079\");\n script_xref(name:\"SuSE\", value:\"SUSE-SU-2022:0211-1\");\n\n script_name(english:\"SUSE SLES15 Security Update : strongswan (SUSE-SU-2022:0211-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote SUSE Linux SLES15 host has packages installed that are affected by a vulnerability as referenced in the SUSE-\nSU-2022:0211-1 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without\n actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only\n authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1194471\");\n # https://lists.suse.com/pipermail/sle-security-updates/2022-January/010126.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4e4c557f\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-45079\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-45079\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/01/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/01/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/01/28\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan-hmac\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan-ipsec\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan-libs0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar release = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nvar os_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLES15', 'SUSE ' + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE ' + os_ver, cpu);\n\nvar sp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0/1\", os_ver + \" SP\" + sp);\n\nvar pkgs = [\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15'},\n {'reference':'strongswan-doc-5.8.2-4.17.1', 'sp':'0', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15.1'},\n {'reference':'strongswan-doc-5.8.2-4.17.1', 'sp':'1', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15.1'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15.1'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15.1'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-15.1'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'1', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-1'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-1'},\n {'reference':'strongswan-doc-5.8.2-4.17.1', 'sp':'1', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-1'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'1', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-1'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-1'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'1', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-1'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-1'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'1', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-1'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-1'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-doc-5.8.2-4.17.1', 'sp':'0', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-doc-5.8.2-4.17.1', 'sp':'0', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-ESPOS-release-15'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-doc-5.8.2-4.17.1', 'sp':'0', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-doc-5.8.2-4.17.1', 'sp':'0', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'0', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'0', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'1', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.1'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.1'},\n {'reference':'strongswan-doc-5.8.2-4.17.1', 'sp':'1', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.1'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'1', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.1'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.1'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'1', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.1'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.1'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'1', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.1'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLE_HPC-LTSS-release-15.1'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'0', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15'},\n {'reference':'strongswan-doc-5.8.2-4.17.1', 'sp':'0', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'0', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'0', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'0', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'1', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15.1'},\n {'reference':'strongswan-doc-5.8.2-4.17.1', 'sp':'1', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15.1'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'1', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15.1'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'1', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15.1'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'1', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-ltss-release-15.1'},\n {'reference':'strongswan-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-15.1'},\n {'reference':'strongswan-doc-5.8.2-4.17.1', 'sp':'1', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-15.1'},\n {'reference':'strongswan-hmac-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-15.1'},\n {'reference':'strongswan-ipsec-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-15.1'},\n {'reference':'strongswan-libs0-5.8.2-4.17.1', 'sp':'1', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-15.1'}\n];\n\nvar ltss_caveat_required = FALSE;\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var exists_check = NULL;\n var rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && release) {\n if (exists_check) {\n if (!rpm_exists(release:release, rpm:exists_check)) continue;\n if ('ltss' >< tolower(exists_check)) ltss_caveat_required = TRUE;\n }\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n var ltss_plugin_caveat = NULL;\n if(ltss_caveat_required) ltss_plugin_caveat = '\\n' +\n 'NOTE: This vulnerability check contains fixes that apply to\\n' +\n 'packages only available in SUSE Enterprise Linux Server LTSS\\n' +\n 'repositories. Access to these package security updates require\\n' +\n 'a paid SUSE LTSS subscription.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + ltss_plugin_caveat\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'strongswan / strongswan-doc / strongswan-hmac / strongswan-ipsec / etc');\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2022-06-15T22:22:13", "description": "The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the ccaea96b-7dcd-11ec-93df-00224d821998 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}, "published": "2022-01-30T00:00:00", "type": "nessus", "title": "FreeBSD : strongswan - Incorrect Handling of Early EAP-Success Messages (ccaea96b-7dcd-11ec-93df-00224d821998)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-45079"], "modified": "2022-02-08T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:strongswan", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_CCAEA96B7DCD11EC93DF00224D821998.NASL", "href": "https://www.tenable.com/plugins/nessus/157235", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# @NOAGENT@\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2021 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n#\n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(157235);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/02/08\");\n\n script_cve_id(\"CVE-2021-45079\");\n\n script_name(english:\"FreeBSD : strongswan - Incorrect Handling of Early EAP-Success Messages (ccaea96b-7dcd-11ec-93df-00224d821998)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote FreeBSD host is missing one or more security-related updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a\nvulnerability as referenced in the ccaea96b-7dcd-11ec-93df-00224d821998 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without\n actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only\n authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n # https://www.strongswan.org/blog/2022/01/24/strongswan-vulnerability-(cve-2021-45079).html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ee40e2cb\");\n # https://vuxml.freebsd.org/freebsd/ccaea96b-7dcd-11ec-93df-00224d821998.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?81a0ec39\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-45079\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/12/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/01/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/01/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:strongswan\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nvar flag = 0;\n\nvar packages = [\n 'strongswan<5.9.5'\n];\n\nforeach var package( packages ) {\n if (pkg_test(save_report:TRUE, pkg: package)) flag++;\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : pkg_report_get()\n );\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2022-06-15T18:15:28", "description": "The remote SUSE Linux SLES12 host has packages installed that are affected by a vulnerability as referenced in the SUSE- SU-2022:0202-1 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}, "published": "2022-01-27T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : strongswan (SUSE-SU-2022:0202-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-45079"], "modified": "2022-02-08T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:strongswan", "p-cpe:/a:novell:suse_linux:strongswan-doc", "p-cpe:/a:novell:suse_linux:strongswan-hmac", "p-cpe:/a:novell:suse_linux:strongswan-ipsec", "p-cpe:/a:novell:suse_linux:strongswan-libs0", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2022-0202-1.NASL", "href": "https://www.tenable.com/plugins/nessus/157151", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# SUSE update advisory SUSE-SU-2022:0202-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(157151);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/02/08\");\n\n script_cve_id(\"CVE-2021-45079\");\n script_xref(name:\"SuSE\", value:\"SUSE-SU-2022:0202-1\");\n\n script_name(english:\"SUSE SLES12 Security Update : strongswan (SUSE-SU-2022:0202-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote SUSE Linux SLES12 host has packages installed that are affected by a vulnerability as referenced in the SUSE-\nSU-2022:0202-1 advisory.\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without\n actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only\n authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1194471\");\n # https://lists.suse.com/pipermail/sle-security-updates/2022-January/010084.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f9b8ade7\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-45079\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-45079\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/01/26\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/01/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/01/27\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan-hmac\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan-ipsec\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan-libs0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar release = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nvar os_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLES12', 'SUSE ' + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE ' + os_ver, cpu);\n\nvar sp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(2|3|4|5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2/3/4/5\", os_ver + \" SP\" + sp);\n\nvar pkgs = [\n {'reference':'strongswan-5.1.3-26.20.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.3'},\n {'reference':'strongswan-doc-5.1.3-26.20.1', 'sp':'3', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.3'},\n {'reference':'strongswan-hmac-5.1.3-26.20.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.3'},\n {'reference':'strongswan-ipsec-5.1.3-26.20.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.3'},\n {'reference':'strongswan-libs0-5.1.3-26.20.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.3'},\n {'reference':'strongswan-5.1.3-26.20.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.4'},\n {'reference':'strongswan-doc-5.1.3-26.20.1', 'sp':'4', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.4'},\n {'reference':'strongswan-hmac-5.1.3-26.20.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.4'},\n {'reference':'strongswan-ipsec-5.1.3-26.20.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.4'},\n {'reference':'strongswan-libs0-5.1.3-26.20.1', 'sp':'4', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.4'},\n {'reference':'strongswan-5.1.3-26.20.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.5'},\n {'reference':'strongswan-doc-5.1.3-26.20.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.5'},\n {'reference':'strongswan-hmac-5.1.3-26.20.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.5'},\n {'reference':'strongswan-ipsec-5.1.3-26.20.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.5'},\n {'reference':'strongswan-libs0-5.1.3-26.20.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'SLES_SAP-release-12.5'},\n {'reference':'strongswan-5.1.3-26.20.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.2'},\n {'reference':'strongswan-doc-5.1.3-26.20.1', 'sp':'2', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.2'},\n {'reference':'strongswan-hmac-5.1.3-26.20.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.2'},\n {'reference':'strongswan-ipsec-5.1.3-26.20.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.2'},\n {'reference':'strongswan-libs0-5.1.3-26.20.1', 'sp':'2', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.2'},\n {'reference':'strongswan-5.1.3-26.20.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.3'},\n {'reference':'strongswan-5.1.3-26.20.1', 'sp':'3', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.3'},\n {'reference':'strongswan-doc-5.1.3-26.20.1', 'sp':'3', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.3'},\n {'reference':'strongswan-doc-5.1.3-26.20.1', 'sp':'3', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.3'},\n {'reference':'strongswan-hmac-5.1.3-26.20.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.3'},\n {'reference':'strongswan-hmac-5.1.3-26.20.1', 'sp':'3', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.3'},\n {'reference':'strongswan-ipsec-5.1.3-26.20.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.3'},\n {'reference':'strongswan-ipsec-5.1.3-26.20.1', 'sp':'3', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.3'},\n {'reference':'strongswan-libs0-5.1.3-26.20.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.3'},\n {'reference':'strongswan-libs0-5.1.3-26.20.1', 'sp':'3', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.3'},\n {'reference':'strongswan-5.1.3-26.20.1', 'sp':'4', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.4'},\n {'reference':'strongswan-doc-5.1.3-26.20.1', 'sp':'4', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.4'},\n {'reference':'strongswan-hmac-5.1.3-26.20.1', 'sp':'4', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.4'},\n {'reference':'strongswan-ipsec-5.1.3-26.20.1', 'sp':'4', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.4'},\n {'reference':'strongswan-libs0-5.1.3-26.20.1', 'sp':'4', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.4'},\n {'reference':'strongswan-5.1.3-26.20.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.5'},\n {'reference':'strongswan-doc-5.1.3-26.20.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.5'},\n {'reference':'strongswan-hmac-5.1.3-26.20.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.5'},\n {'reference':'strongswan-ipsec-5.1.3-26.20.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.5'},\n {'reference':'strongswan-libs0-5.1.3-26.20.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-12.5'}\n];\n\nvar ltss_caveat_required = FALSE;\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var exists_check = NULL;\n var rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && release) {\n if (exists_check) {\n if (!rpm_exists(release:release, rpm:exists_check)) continue;\n if ('ltss' >< tolower(exists_check)) ltss_caveat_required = TRUE;\n }\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n var ltss_plugin_caveat = NULL;\n if(ltss_caveat_required) ltss_plugin_caveat = '\\n' +\n 'NOTE: This vulnerability check contains fixes that apply to\\n' +\n 'packages only available in SUSE Enterprise Linux Server LTSS\\n' +\n 'repositories. Access to these package security updates require\\n' +\n 'a paid SUSE LTSS subscription.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + ltss_plugin_caveat\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'strongswan / strongswan-doc / strongswan-hmac / strongswan-ipsec / etc');\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2022-06-15T18:17:22", "description": "The remote SUSE Linux SLES11 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:14887-1 advisory.\n\n - In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. (CVE-2018-16151)\n\n - In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568. (CVE-2018-16152)\n\n - The gmp plugin in strongSwan before 5.7.1 has a Buffer Overflow via a crafted certificate.\n (CVE-2018-17540)\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}, "published": "2022-02-19T00:00:00", "type": "nessus", "title": "SUSE SLES11 Security Update : strongswan (SUSE-SU-2022:14887-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-4790", "CVE-2014-1568", "CVE-2018-16151", "CVE-2018-16152", "CVE-2018-17540", "CVE-2021-45079"], "modified": "2022-02-19T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:strongswan", "p-cpe:/a:novell:suse_linux:strongswan-doc", "cpe:/o:novell:suse_linux:11"], "id": "SUSE_SU-2022-14887-1.NASL", "href": "https://www.tenable.com/plugins/nessus/158172", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# SUSE update advisory SUSE-SU-2022:14887-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(158172);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/02/19\");\n\n script_cve_id(\n \"CVE-2018-16151\",\n \"CVE-2018-16152\",\n \"CVE-2018-17540\",\n \"CVE-2021-45079\"\n );\n script_xref(name:\"SuSE\", value:\"SUSE-SU-2022:14887-1\");\n\n script_name(english:\"SUSE SLES11 Security Update : strongswan (SUSE-SU-2022:14887-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote SUSE Linux SLES11 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe SUSE-SU-2022:14887-1 advisory.\n\n - In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x\n before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm\n OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan\n regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents\n are being used, which could lead to impersonation when only an RSA signature is used for IKEv2\n authentication. (CVE-2018-16151)\n\n - In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x\n before 5.7.0, the RSA implementation based on GMP does not reject excess data in the\n digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote\n attacker can forge signatures when small public exponents are being used, which could lead to\n impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of\n CVE-2006-4790 and CVE-2014-1568. (CVE-2018-16152)\n\n - The gmp plugin in strongSwan before 5.7.1 has a Buffer Overflow via a crafted certificate.\n (CVE-2018-17540)\n\n - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without\n actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only\n authentication for IKEv2) even without server authentication. (CVE-2021-45079)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1107874\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1109845\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1194471\");\n # https://lists.suse.com/pipermail/sle-security-updates/2022-February/010262.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c6df44a3\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-16151\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-16152\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-17540\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-45079\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected strongswan and / or strongswan-doc packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-45079\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/09/26\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/02/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/02/19\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:strongswan-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar release = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nvar os_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLES11', 'SUSE ' + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE ' + os_ver, cpu);\n\nvar sp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP4\", os_ver + \" SP\" + sp);\n\nvar pkgs = [\n {'reference':'strongswan-4.4.0-6.36.12.1', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'},\n {'reference':'strongswan-doc-4.4.0-6.36.12.1', 'sp':'4', 'release':'SLES11', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'sles-release-11.4'}\n];\n\nvar ltss_caveat_required = FALSE;\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var exists_check = NULL;\n var rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && release) {\n if (exists_check) {\n if (!rpm_exists(release:release, rpm:exists_check)) continue;\n if ('ltss' >< tolower(exists_check)) ltss_caveat_required = TRUE;\n }\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n var ltss_plugin_caveat = NULL;\n if(ltss_caveat_required) ltss_plugin_caveat = '\\n' +\n 'NOTE: This vulnerability check contains fixes that apply to\\n' +\n 'packages only available in SUSE Enterprise Linux Server LTSS\\n' +\n 'repositories. Access to these package security updates require\\n' +\n 'a paid SUSE LTSS subscription.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + ltss_plugin_caveat\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'strongswan / strongswan-doc');\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}], "debian": [{"lastseen": "2022-06-27T06:20:05", "description": "- -----------------------------------------------------------------------\nDebian LTS Advisory DLA-2909-1 debian-lts@lists.debian.org\nhttps://www.debian.org/lts/security/ Utkarsh Gupta\nFebruary 03, 2022 https://wiki.debian.org/LTS\n- -----------------------------------------------------------------------\n\nPackage : strongswan\nVersion : 5.5.1-4+deb9u6\nCVE ID : CVE-2021-45079\n\nZhuowei Zhang discovered a bug in the EAP authentication client code\nof strongSwan, an IKE/IPsec suite, that may allow to bypass the client\nand in some scenarios even the server authentication, or could lead to\na denial-of-service attack.\n\nFor Debian 9 stretch, this problem has been fixed in version\n5.5.1-4+deb9u6.\n\nWe recommend that you upgrade your strongswan packages.\n\nFor the detailed security status of strongswan please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/strongswan\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-02-03T19:29:32", "type": "debian", "title": "[SECURITY] [DLA 2909-1] strongswan security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079"], "modified": "2022-02-03T19:29:32", "id": "DEBIAN:DLA-2909-1:F4017", "href": "https://lists.debian.org/debian-lts-announce/2022/02/msg00003.html", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2022-06-27T06:15:20", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-5056-1 security@debian.org\nhttps://www.debian.org/security/ Yves-Alexis Perez\nJanuary 24, 2022 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : strongswan\nCVE ID : CVE-2021-45079\n\nZhuowei Zhang discovered a bug in the EAP authentication client code of\nstrongSwan, an IKE/IPsec suite, that may allow to bypass the client and in some\nscenarios even the server authentication, or could lead to a denial-of-service\nattack.\n\nWhen using EAP authentication (RFC 3748), the successful completion of the\nauthentication is indicated by an EAP-Success message sent by the server to the\nclient. strongSwan's EAP client code handled early EAP-Success messages\nincorrectly, either crashing the IKE daemon or concluding the EAP method\nprematurely.\n\nEnd result depend on the used configuration, more details can be found in\nupstream advisory at\nhttps://www.strongswan.org/blog/2022/01/24/strongswan-vulnerability-(cve-2021-45079).html\n\nFor the oldstable distribution (buster), this problem has been fixed\nin version 5.7.2-1+deb10u2.\n\nFor the stable distribution (bullseye), this problem has been fixed in\nversion 5.9.1-1+deb11u2.\n\nWe recommend that you upgrade your strongswan packages.\n\nFor the detailed security status of strongswan please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/strongswan\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-01-24T17:14:03", "type": "debian", "title": "[SECURITY] [DSA 5056-1] strongswan security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079"], "modified": "2022-01-24T17:14:03", "id": "DEBIAN:DSA-5056-1:87B5F", "href": "https://lists.debian.org/debian-security-announce/2022/msg00022.html", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}], "cve": [{"lastseen": "2022-06-14T19:09:53", "description": "In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-01-31T08:15:00", "type": "cve", "title": "CVE-2021-45079", "cwe": ["CWE-287"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079"], "modified": "2022-06-14T14:38:00", "cpe": ["cpe:/o:fedoraproject:fedora:35", "cpe:/a:fedoraproject:extra_packages_for_enterprise_linux:7.0", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:debian:debian_linux:11.0", "cpe:/o:debian:debian_linux:9.0", "cpe:/o:canonical:ubuntu_linux:18.04", "cpe:/a:fedoraproject:extra_packages_for_enterprise_linux:9.0", "cpe:/o:canonical:ubuntu_linux:21.10", "cpe:/o:fedoraproject:fedora:34", "cpe:/o:debian:debian_linux:10.0", "cpe:/a:fedoraproject:extra_packages_for_enterprise_linux:8.0", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:canonical:ubuntu_linux:20.04"], "id": "CVE-2021-45079", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45079", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"]}], "ubuntucve": [{"lastseen": "2022-02-10T00:00:00", "description": "In strongSwan before 5.9.5, a malicious responder can send an EAP-Success\nmessage too early without actually authenticating the client and (in the\ncase of EAP methods with mutual authentication and EAP-only authentication\nfor IKEv2) even without server authentication.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-01-24T00:00:00", "type": "ubuntucve", "title": "CVE-2021-45079", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079"], "modified": "2022-01-24T00:00:00", "id": "UB:CVE-2021-45079", "href": "https://ubuntu.com/security/CVE-2021-45079", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}], "suse": [{"lastseen": "2022-04-18T12:39:45", "description": "An update that fixes one vulnerability is now available.\n\nDescription:\n\n This update for strongswan fixes the following issues:\n\n - CVE-2021-45079: Fixed authentication bypass in EAP authentication.\n (bsc#1194471)\n\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.4:\n\n zypper in -t patch openSUSE-SLE-15.4-2022-492=1\n\n - openSUSE Leap 15.3:\n\n zypper in -t patch openSUSE-SLE-15.3-2022-492=1", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-02-18T00:00:00", "type": "suse", "title": "Security update for strongswan (important)", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079"], "modified": "2022-02-18T00:00:00", "id": "OPENSUSE-SU-2022:0492-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDDGV75VWTCAFSBICC2NAFQ3EN5G6NAI/", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}], "fedora": [{"lastseen": "2022-02-10T00:00:00", "description": "The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key exchange protocols in conjunction with the native NETKEY IPsec stack of the Linux kernel. ", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-02-04T01:23:04", "type": "fedora", "title": "[SECURITY] Fedora 34 Update: strongswan-5.9.5-2.fc34", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079"], "modified": "2022-02-04T01:23:04", "id": "FEDORA:D3F8830A9F1A", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/DEDU53NNCEKMB5XYTVS3JCA6ZTJDFPVI/", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2022-02-10T00:00:00", "description": "The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key exchange protocols in conjunction with the native NETKEY IPsec stack of the Linux kernel. ", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-02-04T01:23:28", "type": "fedora", "title": "[SECURITY] Fedora 35 Update: strongswan-5.9.5-2.fc35", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079"], "modified": "2022-02-04T01:23:28", "id": "FEDORA:ACD053081CE4", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4IVPOQNIJDD6TSJ3NMQQPEHBZ6BZ7JR2/", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}], "ubuntu": [{"lastseen": "2022-02-09T11:39:44", "description": "USN-5250-1 fixed a vulnerability in strongSwan. This update provides \nthe corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.\n\nOriginal advisory details:\n\nZhuowei Zhang discovered that stringSwan incorrectly handled EAP \nauthentication. A remote attacker could use this issue to cause strongSwan \nto crash, resulting in a denial of service, or possibly bypass client and \nserver authentication.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-01-24T00:00:00", "type": "ubuntu", "title": "strongSwan vulnerability", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079"], "modified": "2022-01-24T00:00:00", "id": "USN-5250-2", "href": "https://ubuntu.com/security/notices/USN-5250-2", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2022-02-10T00:00:00", "description": "Zhuowei Zhang discovered that stringSwan incorrectly handled EAP \nauthentication. A remote attacker could use this issue to cause strongSwan \nto crash, resulting in a denial of service, or possibly bypass client and \nserver authentication.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-01-24T00:00:00", "type": "ubuntu", "title": "strongSwan vulnerability", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079"], "modified": "2022-01-24T00:00:00", "id": "USN-5250-1", "href": "https://ubuntu.com/security/notices/USN-5250-1", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}], "freebsd": [{"lastseen": "2022-02-10T00:00:00", "description": "\n\nStrongswan Release Notes reports:\n\nFixed a vulnerability in the EAP client implementation\n\t that was caused by incorrectly handling early EAP-Success\n\t messages. It may allow to bypass the client and in some\n\t scenarios even the server authentication, or could lead to\n\t a denial-of-service attack. This vulnerability has been\n\t registered as CVE-2021-45079.\n\n\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2021-12-16T00:00:00", "type": "freebsd", "title": "strongswan - Incorrect Handling of Early EAP-Success Messages", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079"], "modified": "2021-12-16T00:00:00", "id": "CCAEA96B-7DCD-11EC-93DF-00224D821998", "href": "https://vuxml.freebsd.org/freebsd/ccaea96b-7dcd-11ec-93df-00224d821998.html", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}], "veracode": [{"lastseen": "2022-06-18T15:35:46", "description": "strongswan is vulnerable to Authentication Bypass. The vulnerability exists due to improper handling of EAP-Success messages. A remote attacker can send a specially crafted (early) EAP-Success message to the affected system and bypass authentication or perform a denial of service attack.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-01-26T05:09:51", "type": "veracode", "title": "Authentication Bypass", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079"], "modified": "2022-06-14T16:21:11", "id": "VERACODE:33898", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-33898/summary", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}], "debiancve": [{"lastseen": "2022-05-10T07:49:52", "description": "In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-01-31T08:15:00", "type": "debiancve", "title": "CVE-2021-45079", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079"], "modified": "2022-01-31T08:15:00", "id": "DEBIANCVE:CVE-2021-45079", "href": "https://security-tracker.debian.org/tracker/CVE-2021-45079", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}], "alpinelinux": [{"lastseen": "2022-07-02T22:10:03", "description": "In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-01-31T08:15:00", "type": "alpinelinux", "title": "CVE-2021-45079", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079"], "modified": "2022-06-14T14:38:00", "id": "ALPINE:CVE-2021-45079", "href": "https://security.alpinelinux.org/vuln/CVE-2021-45079", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}], "photon": [{"lastseen": "2022-05-12T18:53:13", "description": "Updates of ['linux-aws', 'linux-secure', 'strongswan', 'linux-rt', 'linux', 'linux-esx'] packages of Photon OS have been released.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-02-11T00:00:00", "type": "photon", "title": "Critical Photon OS Security Update - PHSA-2022-0152", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079", "CVE-2022-0435"], "modified": "2022-02-11T00:00:00", "id": "PHSA-2022-0152", "href": "https://github.com/vmware/photon/wiki/Security-Update-4.0-152", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-05-12T18:11:44", "description": "Updates of ['mariadb', 'strongswan'] packages of Photon OS have been released.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-02-11T00:00:00", "type": "photon", "title": "Critical Photon OS Security Update - PHSA-2022-0439", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-45079", "CVE-2021-46657", "CVE-2021-46658", "CVE-2021-46659", "CVE-2021-46666", "CVE-2021-46667"], "modified": "2022-02-11T00:00:00", "id": "PHSA-2022-0439", "href": "https://github.com/vmware/photon/wiki/Security-Update-2.0-439", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2022-05-12T18:37:46", "description": "Updates of ['linux-aws', 'linux-secure', 'linux', 'apache-tomcat', 'linux-rt', 'linux-esx', 'go', 'strongswan', 'mariadb'] packages of Photon OS have been released.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-02-09T00:00:00", "type": "photon", "title": "Critical Photon OS Security Update - PHSA-2022-0361", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-44716", "CVE-2021-44717", "CVE-2021-45079", "CVE-2021-46657", "CVE-2021-46658", "CVE-2021-46659", "CVE-2021-46666", "CVE-2021-46667", "CVE-2022-0435", "CVE-2022-0492", "CVE-2022-23181"], "modified": "2022-02-09T00:00:00", "id": "PHSA-2022-0361", "href": "https://github.com/vmware/photon/wiki/Security-Update-3.0-361", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}]}