Jump to content

Synopsis Updated ipsec-tools packages fix multip


Recommended Posts

Package name ipsec-tools

Date July 14th, 2004

Advisory ID MDKSA-2004:069

Affected versions 10.0

 

Synopsis Updated ipsec-tools packages fix multiple vulnerabilities

 

Problem Description

 

A vulnerability in racoon prior to version 20040408a would allow a remote attacker to cause a DoS (memory consumption) via an ISAKMP packet with a large length field.

 

Another vulnerability in racoon was discovered where, when using RSA signatures, racoon would validate the X.509 certificate but would not validate the signature. This can be exploited by an attacker sending a valid and trusted X.509 certificate and any private key. Using this, they could perform a man-in-the-middle attack and initiate an unauthorized connection. This has been fixed in ipsec-tools 0.3.3.

 

The updated packages contain patches backported from 0.3.3 to correct the problem.

 

References

 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0403

 

Upgrade

 

To upgrade automatically, use MandrakeUpdate.

 

Verification

 

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command:

 

rpm --checksig package.rpm

 

You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM.

 

If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.

Link to comment
Share on other sites

 Share

×
×
  • Create New...