From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1M8DgR-0003Hy-Hp for garchives@archives.gentoo.org; Sun, 24 May 2009 13:24:11 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id F22E8E0414; Sun, 24 May 2009 13:22:47 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by pigeon.gentoo.org (Postfix) with ESMTP id 332C3E0366 for ; Sun, 24 May 2009 13:20:56 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp.gentoo.org (Postfix) with ESMTP id D9BF6659C3 for ; Sun, 24 May 2009 13:20:55 +0000 (UTC) X-Virus-Scanned: amavisd-new at gentoo.org X-Spam-Score: -1.998 X-Spam-Level: X-Spam-Status: No, score=-1.998 required=5.5 tests=[AWL=0.601, BAYES_00=-2.599] Received: from smtp.gentoo.org ([127.0.0.1]) by localhost (smtp.gentoo.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l9N17bGTBjWt for ; Sun, 24 May 2009 13:20:48 +0000 (UTC) Received: from mail.netloc.info (mail.netloc.info [84.16.251.62]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTP id 8B2926538A for ; Sun, 24 May 2009 13:20:47 +0000 (UTC) Received: from [192.168.178.31] (p50818EAA.dip0.t-ipconnect.de [80.129.142.170]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client did not present a certificate) by mail.netloc.info (Postfix) with ESMTPSA id 906C09F735; Sun, 24 May 2009 15:20:38 +0200 (CEST) Subject: [gentoo-announce] [ GLSA 200905-03 ] IPSec Tools: Denial of Service From: Alex Legler To: gentoo-announce@lists.gentoo.org Cc: bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk, security-alerts@linuxsecurity.com Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="=-+mUbbsAhLaNnLO7Q5eNs" Date: Sun, 24 May 2009 15:20:38 +0200 Message-Id: <1243171239.23024.4.camel@localhost> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@lists.gentoo.org Mime-Version: 1.0 X-Mailer: Evolution 2.26.2 X-Archives-Salt: 3c3e489e-fecd-49b5-8364-95cab4c72d72 X-Archives-Hash: 9c09dc9b5c444f1dd19b00ac6403815d --=-+mUbbsAhLaNnLO7Q5eNs Content-Type: text/plain Content-Transfer-Encoding: quoted-printable - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200905-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: IPSec Tools: Denial of Service Date: May 24, 2009 Bugs: #267135 ID: 200905-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis =3D=3D=3D=3D=3D=3D=3D=3D Multiple errors in the IPSec Tools racoon daemon might allow remote attackers to cause a Denial of Service. Background =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D The IPSec Tools are a port of KAME's IPsec utilities to the Linux-2.6 IPsec implementation. They include racoon, an Internet Key Exchange daemon for automatically keying IPsec connections. Affected packages =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-firewall/ipsec-tools < 0.7.2 >=3D 0.7.2 Description =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D The following vulnerabilities have been found in the racoon daemon as shipped with IPSec Tools: * Neil Kettle reported that racoon/isakmp_frag.c is prone to a null-pointer dereference (CVE-2009-1574). * Multiple memory leaks exist in (1) the eay_check_x509sign() function in racoon/crypto_openssl.c and (2) racoon/nattraversal.c (CVE-2009-1632). Impact =3D=3D=3D=3D=3D=3D A remote attacker could send specially crafted fragmented ISAKMP packets without a payload or exploit vectors related to X.509 certificate authentication and NAT traversal, possibly resulting in a crash of the racoon daemon. Workaround =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D There is no known workaround at this time. Resolution =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D All IPSec Tools users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=3Dnet-firewall/ipsec-tools-0.7.2" References =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D [ 1 ] CVE-2009-1574 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2009-1574 [ 2 ] CVE-2009-1632 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2009-1632 Availability =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200905-03.xml Concerns? =3D=3D=3D=3D=3D=3D=3D=3D=3D Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License =3D=3D=3D=3D=3D=3D=3D Copyright 2009 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 --=-+mUbbsAhLaNnLO7Q5eNs Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.11 (GNU/Linux) iEYEABECAAYFAkoZSaYACgkQk+oqhfPAZGn2cwCgkYgETTUJueXoC0yPH6y+tH8b ETAAoJURJ0LAW1giRZ8DRC18fgZTKbQr =Rxj4 -----END PGP SIGNATURE----- --=-+mUbbsAhLaNnLO7Q5eNs--