exploit-db-mirror/platforms/hardware/remote/22532.txt
Offensive Security 5924dde297 DB: 2015-03-19
2 new exploits
2015-03-19 09:39:10 +00:00

5 lines
No EOL
523 B
Text
Executable file

source: http://www.securityfocus.com/bid/7423/info
When a VPN is configured to use a pre-shared master secret and a client attempts to negotiate keys in aggressive mode, a hash of the secret is transmitted across the network in clear-text. This may result in the hash being leaked to eavesdroppers or malicious clients. An offline brute-force attack on this hash may then be performed to obtain the clear-text secret.
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/22532.tar.gz