FreeS/WAN 1.x and 2.x, and other related products including superfreeswan 1.x, openswan 1.x before 1.0.6, openswan 2.x before 2.1.4, and strongSwan before 2.1.3, allows remote attackers to authenticate using spoofed PKCS#7 certificates in which a self-signed certificate identifies an alternate Certificate Authority (CA) and spoofed issuer and subject.
References
Link | Resource |
---|---|
http://security.gentoo.org/glsa/glsa-200406-20.xml | Patch Vendor Advisory |
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:070 | Patch Vendor Advisory |
http://www.openswan.org/support/vuln/can-2004-0590/ | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16515 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2004-12-06 05:00
Updated : 2024-02-04 16:31
NVD link : CVE-2004-0590
Mitre link : CVE-2004-0590
CVE.ORG link : CVE-2004-0590
JSON object : View
Products Affected
strongswan
- strongswan
frees_wan
- frees_wan
- super_frees_wan
openswan
- openswan
CWE