CVE-2004-0590
Summary
| CVE | CVE-2004-0590 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2004-12-06 05:00:00 UTC |
| Updated | 2017-07-11 01:30:00 UTC |
| Description | FreeS/WAN 1.x and 2.x, and other related products including superfreeswan 1.x, openswan 1.x before 1.0.6, openswan 2.x before 2.1.4, and strongSwan before 2.1.3, allows remote attackers to authenticate using spoofed PKCS#7 certificates in which a self-signed certificate identifies an alternate Certificate Authority (CA) and spoofed issuer and subject. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Frees Wan | Frees Wan | 1 | All | All | All |
| Application | Frees Wan | Frees Wan | 2 | All | All | All |
| Application | Frees Wan | Frees Wan | 1 | All | All | All |
| Application | Frees Wan | Frees Wan | 2 | All | All | All |
| Application | Frees Wan | Super Frees Wan | 1 | All | All | All |
| Application | Frees Wan | Super Frees Wan | 1 | All | All | All |
| Application | Openswan | Openswan | 1 | All | All | All |
| Application | Openswan | Openswan | 2 | All | All | All |
| Application | Openswan | Openswan | 1 | All | All | All |
| Application | Openswan | Openswan | 2 | All | All | All |
| Application | Strongswan | Strongswan | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Gentoo Linux Documentation -- FreeS/WAN, Openswan, strongSwan: Vulnerabilities in certificate handling | GENTOO | security.gentoo.org | Patch, Vendor Advisory |
| Openswan: CAN-2004-0590 | CONFIRM | www.openswan.org | Patch, Vendor Advisory |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| MDKSA-2004:070 | MANDRAKE | www.mandrakesecure.net | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.