strongSwan-5.0.4 released / ECDSA signature vulnerability

2013.04.30
Credit: Tobias
Risk: High
Local: No
Remote: Yes
CWE: CWE-287


CVSS Base Score: 4.9/10
Impact Subscore: 4.9/10
Exploitability Subscore: 6.8/10
Exploit range: Remote
Attack complexity: Medium
Authentication: Single time
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: None

We just released strongSwan 5.0.4, which fixes a security vulnerability (CVE-2013-2944) that exists in all versions since 4.3.5 and up to 5.0.3. If the strongSwan "openssl" plugin is used for ECDSA signature verification, an empty, zeroed or otherwise invalid signature is handled as a legitimate one. Affected are only installations that have enabled and loaded the OpenSSL crypto backend (--enable-openssl). Builds using the default crypto backends are not affected. While this new ECDSA vulnerability is very similar to the RSA signature vulnerability CVE-2012-2388, it is not directly related. A connection definition using ECDSA authentication is required to exploit this vulnerability. Given that, an attacker presenting a forged signature and/or certificate can authenticate as any legitimate user. Injecting code is not possible by such an attack. The patch at [1] fixes the vulnerability and should apply to all affected versions. strongSwan 5.0.4 includes the fix and other minor changes and can be downloaded from [2]. This vulnerability was discovered by Kevin Wojtysiak, an independent Security Consultant. We want to express our thanks to Kevin for notifying us in advance about this critical security issue. The above information can also be found in our blog entry at [3]. Our apologies for having such a serious vulnerability in the strongSwan codebase. Kind Regards, Tobias [1] http://download.strongswan.org/patches/10_openssl_ecdsa_signature_patch/ [2] http://www.strongswan.org/download.html [3] http://www.strongswan.org/strongswan-5.0.4-released-(cve-2013-2944).html

References:

http://download.strongswan.org/patches/10_openssl_ecdsa_signature_patch/
http://www.strongswan.org/strongswan-5.0.4-released-(cve-2013-2944).html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top