From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from <gentoo-announce+bounces-1133-garchives=archives.gentoo.org@lists.gentoo.org>) id 1MlNMO-00063E-0H for garchives@archives.gentoo.org; Wed, 09 Sep 2009 13:37:20 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 79C77E0999; Wed, 9 Sep 2009 13:24:32 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by pigeon.gentoo.org (Postfix) with ESMTP id 01ABFE07CC for <gentoo-announce@lists.gentoo.org>; Wed, 9 Sep 2009 13:21:02 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp.gentoo.org (Postfix) with ESMTP id 9503E6715E for <gentoo-announce@lists.gentoo.org>; Wed, 9 Sep 2009 13:21:01 +0000 (UTC) X-Virus-Scanned: amavisd-new at gentoo.org X-Spam-Score: -3.125 X-Spam-Level: X-Spam-Status: No, score=-3.125 required=5.5 tests=[AWL=-0.526, BAYES_00=-2.599] Received: from smtp.gentoo.org ([127.0.0.1]) by localhost (smtp.gentoo.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JctMxtykVWVm for <gentoo-announce@lists.gentoo.org>; Wed, 9 Sep 2009 13:20:55 +0000 (UTC) Received: from mail.netloc.info (mail.netloc.info [84.16.251.62]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTP id AA9CC66F45 for <gentoo-announce@gentoo.org>; Wed, 9 Sep 2009 13:20:54 +0000 (UTC) Received: from neon (p508188CD.dip0.t-ipconnect.de [80.129.136.205]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (Client did not present a certificate) by mail.netloc.info (Postfix) with ESMTPSA id B51559F653; Wed, 9 Sep 2009 15:20:51 +0200 (CEST) Date: Wed, 9 Sep 2009 15:20:40 +0200 From: Alex Legler <a3li@gentoo.org> To: gentoo-announce@lists.gentoo.org Cc: bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk, security-alerts@linuxsecurity.com Subject: [gentoo-announce] [ GLSA 200909-05 ] Openswan: Denial of Service Message-ID: <20090909152040.522566bb@neon> X-Mailer: Claws Mail 3.7.2 (GTK+ 2.16.5; x86_64-pc-linux-gnu) Precedence: bulk List-Post: <mailto:gentoo-announce@lists.gentoo.org> List-Help: <mailto:gentoo-announce+help@lists.gentoo.org> List-Unsubscribe: <mailto:gentoo-announce+unsubscribe@lists.gentoo.org> List-Subscribe: <mailto:gentoo-announce+subscribe@lists.gentoo.org> List-Id: Gentoo Linux mail <gentoo-announce.gentoo.org> X-BeenThere: gentoo-announce@lists.gentoo.org Mime-Version: 1.0 Content-Type: multipart/signed; micalg=PGP-SHA1; boundary="Sig_/h1oPc4LhZo1zaq.08c6tEQD"; protocol="application/pgp-signature" X-Archives-Salt: fa357019-840f-4f03-9bc9-090bf328a367 X-Archives-Hash: 949c33856bd94f6124c07c82d4a45e11 --Sig_/h1oPc4LhZo1zaq.08c6tEQD Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200909-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Openswan: Denial of Service Date: September 09, 2009 Bugs: #264346, #275233 ID: 200909-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis =3D=3D=3D=3D=3D=3D=3D=3D Multiple vulnerabilities in the pluto IKE daemon of Openswan might allow remote attackers to cause a Denial of Service. Background =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Openswan is an implementation of IPsec for Linux. Affected packages =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/openswan < 2.4.15 >=3D 2.4.15 Description =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Multiple vulnerabilities have been discovered in Openswan: * Gerd v. Egidy reported a NULL pointer dereference in the Dead Peer Detection of the pluto IKE daemon as included in Openswan (CVE-2009-0790). * The Orange Labs vulnerability research team discovered multiple vulnerabilities in the ASN.1 parser (CVE-2009-2185). Impact =3D=3D=3D=3D=3D=3D A remote attacker could exploit these vulnerabilities by sending specially crafted R_U_THERE or R_U_THERE_ACK packets, or a specially crafted X.509 certificate containing a malicious Relative Distinguished Name (RDN), UTCTIME string or GENERALIZEDTIME string to cause a Denial of Service of the pluto IKE daemon. Workaround =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D There is no known workaround at this time. Resolution =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D All Openswan users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose =3Dnet-misc/openswan-2.4.15 References =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D [ 1 ] CVE-2009-0790 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2009-0790 [ 2 ] CVE-2009-2185 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2009-2185 Availability =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200909-05.xml Concerns? =3D=3D=3D=3D=3D=3D=3D=3D=3D Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License =3D=3D=3D=3D=3D=3D=3D Copyright 2009 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 --Sig_/h1oPc4LhZo1zaq.08c6tEQD Content-Type: application/pgp-signature; name=signature.asc Content-Disposition: attachment; filename=signature.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.11 (GNU/Linux) iEYEARECAAYFAkqnq68ACgkQk+oqhfPAZGknSQCdHk6lnjAwz+yztun4BylZ4lg+ hI8An1nBcpYu1ZR1mzMoIT9PyA3owjXC =hQMT -----END PGP SIGNATURE----- --Sig_/h1oPc4LhZo1zaq.08c6tEQD--