CVE-2004-0590
Summary
| CVE | CVE-2004-0590 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2004-12-06 05:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | FreeS/WAN 1.x and 2.x, and other related products including superfreeswan 1.x, openswan 1.x before 1.0.6, openswan 2.x before 2.1.4, and strongSwan before 2.1.3, allows remote attackers to authenticate using spoofed PKCS#7 certificates in which a self-signed certificate identifies an alternate Certificate Authority (CA) and spoofed issuer and subject. |
Risk And Classification
Primary CVSS: v2.0 10 from [email protected]
AV:N/AC:L/Au:N/C:C/I:C/A:C
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Frees Wan | Frees Wan | 1 | All | All | All |
| Application | Frees Wan | Frees Wan | 2 | All | All | All |
| Application | Frees Wan | Super Frees Wan | 1 | All | All | All |
| Application | Openswan | Openswan | 1 | All | All | All |
| Application | Openswan | Openswan | 2 | All | All | All |
| Application | Strongswan | Strongswan | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Openswan: CAN-2004-0590 | af854a3a-2127-422b-91ae-364da2661108 | www.openswan.org | Patch, Vendor Advisory |
| www.mandrakesecure.net/en/advisories/advisory.php | af854a3a-2127-422b-91ae-364da2661108 | www.mandrakesecure.net | Patch, Vendor Advisory |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| Gentoo Linux Documentation -- FreeS/WAN, Openswan, strongSwan: Vulnerabilities in certificate handling | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.