lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1HdZNS-0005Pa-Gl@artemis.annvix.ca>
Date: Mon, 16 Apr 2007 16:08:50 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2007:084 ] - Updated ipsec-tools packages fix DoS vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:084
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : ipsec-tools
 Date    : April 16, 2007
 Affected: 2007.0, 2007.1, Corporate 4.0, Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 The ipsec-tools package prior to version 0.6.7 allows remote attackers
 to cause a Denial of Service (tunnel crash) via crafted DELTE and
 NOTIFY messages.
 
 Updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1841
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 45dbff65f54ae18f638bd7ba0bbaf42e  2007.0/i586/ipsec-tools-0.6.6-2.1mdv2007.0.i586.rpm
 e436d6c8455d234147142ae385b5257d  2007.0/i586/libipsec0-0.6.6-2.1mdv2007.0.i586.rpm
 545ac1abb2e59ec822c5484e7ceb0164  2007.0/i586/libipsec0-devel-0.6.6-2.1mdv2007.0.i586.rpm 
 50d4165a6a97f09778011f33d6d44ca0  2007.0/SRPMS/ipsec-tools-0.6.6-2.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 e2699ff4ac621bf8513a5fe08666a9ec  2007.0/x86_64/ipsec-tools-0.6.6-2.1mdv2007.0.x86_64.rpm
 46ea919ab6e9df83a84b0a34928d65f4  2007.0/x86_64/lib64ipsec0-0.6.6-2.1mdv2007.0.x86_64.rpm
 b36bd1ea7adc31f592eedb2abb5d33fc  2007.0/x86_64/lib64ipsec0-devel-0.6.6-2.1mdv2007.0.x86_64.rpm 
 50d4165a6a97f09778011f33d6d44ca0  2007.0/SRPMS/ipsec-tools-0.6.6-2.1mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 a1fe5334c70d983076d28689277c5968  2007.1/i586/ipsec-tools-0.6.6-2.1mdv2007.1.i586.rpm
 8bee44d6e3f2248634d15cb1370b4f6e  2007.1/i586/libipsec0-0.6.6-2.1mdv2007.1.i586.rpm
 b06ab01becf6435a4c24c1a0434f062b  2007.1/i586/libipsec0-devel-0.6.6-2.1mdv2007.1.i586.rpm 
 ea4a41f7bc9fcbdff99ece8d87701b46  2007.1/SRPMS/ipsec-tools-0.6.6-2.1mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 e825119d669cc71752c766e43e90eae9  2007.1/x86_64/ipsec-tools-0.6.6-2.1mdv2007.1.x86_64.rpm
 ca27f136089ae600bea5ee00aeda0ce6  2007.1/x86_64/lib64ipsec0-0.6.6-2.1mdv2007.1.x86_64.rpm
 954f74bc941fa199a619ba265e78097c  2007.1/x86_64/lib64ipsec0-devel-0.6.6-2.1mdv2007.1.x86_64.rpm 
 ea4a41f7bc9fcbdff99ece8d87701b46  2007.1/SRPMS/ipsec-tools-0.6.6-2.1mdv2007.1.src.rpm

 Corporate 4.0:
 be76171c672159b4f0f816c1ec5aab11  corporate/4.0/i586/ipsec-tools-0.6.5-2.1.20060mlcs4.i586.rpm
 076f5b9d0411a3f4632f4e981a26b3b7  corporate/4.0/i586/libipsec0-0.6.5-2.1.20060mlcs4.i586.rpm
 acce65810ca8328bca7e0286056f34f3  corporate/4.0/i586/libipsec0-devel-0.6.5-2.1.20060mlcs4.i586.rpm 
 1b91757b0c1f4e39eb5d3737f232fb68  corporate/4.0/SRPMS/ipsec-tools-0.6.5-2.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 d5ebff7776ab22fe09cf688d590697a3  corporate/4.0/x86_64/ipsec-tools-0.6.5-2.1.20060mlcs4.x86_64.rpm
 ead3bf23ba08bd776595053e8f3b8585  corporate/4.0/x86_64/lib64ipsec0-0.6.5-2.1.20060mlcs4.x86_64.rpm
 c743b116469e8443a14ce40d8549f26c  corporate/4.0/x86_64/lib64ipsec0-devel-0.6.5-2.1.20060mlcs4.x86_64.rpm 
 1b91757b0c1f4e39eb5d3737f232fb68  corporate/4.0/SRPMS/ipsec-tools-0.6.5-2.1.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 9d15b12b6265294254c4395d576af399  mnf/2.0/i586/ipsec-tools-0.2.5-0.4.M20mdk.i586.rpm
 9f1baa807c3f8c2fce15c51799d371d4  mnf/2.0/i586/ipsec-tools-0.2.5-0.5.M20mdk.i586.rpm
 438f827336c17aad6d6639e968d754b4  mnf/2.0/i586/libipsec-tools0-0.2.5-0.5.M20mdk.i586.rpm 
 eec95352e1b736a90f86c580925bcb8c  mnf/2.0/SRPMS/ipsec-tools-0.2.5-0.5.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGI8kTmqjQ0CJFipgRAn+GAJ99POpenumSnklSrGeqjk2WuOcTEgCgnPjr
d13W58lzCc6927VxZiwB+D0=
=XpwK
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ