[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2013:231 -- Mandriva openswan

ID: oval:org.secpod.oval:def:1300235Date: (C)2013-11-01   (M)2023-12-07
Class: PATCHFamily: unix




Multiple vulnerabilities has been discovered and corrected in openswan: The IPSEC livetest tool in Openswan 2.4.12 and earlier, and 2.6.x through 2.6.16, allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack on the ipseclive.conn and ipsec.olts.remote.log temporary files. NOTE: in many distributions and the upstream version, this tool has been disabled . The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service via a crafted R_U_THERE or R_U_THERE_ACK Dead Peer Detection IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD . The ASN.1 parser in strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service via an X.509 certificate with crafted Relative Distinguished Names , a crafted UTCTIME string, or a crafted GENERALIZEDTIME string . Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service via vectors related to the quick_outI1_continue and quick_outI1 functions . Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054 . The updated packages have been patched to correct these issues.

Platform:
Mandriva Enterprise Server 5.2
Product:
openswan
Reference:
MDVSA-2013:231
CVE-2008-4190
CVE-2009-0790
CVE-2009-2185
CVE-2011-4073
CVE-2013-2052
CVE-2013-2054
CVE-2013-2053
CVE    7
CVE-2011-4073
CVE-2008-4190
CVE-2009-0790
CVE-2009-2185
...
CPE    1
cpe:/o:mandriva:enterprise_server:5.2

© SecPod Technologies