[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1977982147.20070611141810@SECURITY.NNOV.RU>
Date: Mon, 11 Jun 2007 14:18:10 +0400
From: 3APA3A <3APA3A@...URITY.NNOV.RU>
To: dann frazier <dannf@...ian.org>
Cc: bugtraq@...urityfocus.com, listadmin@...URITYFOCUS.COM
Subject: Re: [SECURITY] [DSA 1299-1] New ipsec-tools packages fix denial of service
Dear dann frazier,
Can you please provide valid CVE for this advisory, if any?
CVE-2007-2524 is Cross-site scripting (XSS) vulnerability in index.pl
in OTRS (Open Ticket Request System) 2.0.x allows remote attackers to
inject arbitrary web script or HTML via the Subaction parameter in an
AgentTicketMailbox Action.
--Thursday, June 7, 2007, 9:52:59 PM, you wrote to bugtraq@...urityfocus.com:
df> -----BEGIN PGP SIGNED MESSAGE-----
df> Hash: SHA1
df> -
df> ---------------------------------------------------------------------------
df> Debian Security Advisory DSA 1299-1 security@...ian.org
df> http://www.debian.org/security/ dann frazier
df> June 7th, 2007
df> http://www.debian.org/security/faq
df> -
df> ---------------------------------------------------------------------------
df> Package : ipsec-tools
df> Vulnerability : missing input sanitising
df> Problem-Type : remote
df> Debian-specific: no
df> CVE ID : CVE-2007-2524
df> It was discovered that a specially-crafted packet sent to the racoon
df> ipsec key exchange server could cause a tunnel to crash, resulting in
df> a denial of service.
df> The oldstable distribution (sarge) isn't affected by this problem.
df> For the stable distribution (etch) this problem has been fixed in
df> version 1:0.6.6-3.1.
df> The unstable distribution (sid) will be fixed soon.
df> We recommend that you upgrade your racoon package.
df> Upgrade Instructions
df> - ---------------------
df> wget url
df> will fetch the file for you
df> dpkg -i file.deb
df> will install the referenced file.
df> If you are using the apt-get package manager, use the line for
df> sources.list as given below:
df> apt-get update
df> will update the internal database
df> apt-get upgrade
df> will install corrected packages
df> You may use an automated update by adding the resources from the
df> footer to the proper configuration.
df> Debian GNU/Linux 4.0 alias etch
df> - --------------------------------
df> Source archives:
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1.dsc
df> Size/MD5 checksum: 714 8b0036099ce66a7cbe83e54d0b904af2
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1.diff.gz
df> Size/MD5 checksum: 49981 087edd1d11957b09b2171900a9b11861
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6.orig.tar.gz
df> Size/MD5 checksum: 914807 643a238e17148d242c603c511e28d029
df> Alpha architecture:
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_alpha.deb
df> Size/MD5 checksum: 97060 2532ce5a61a9ddda86d2dc2b6c2fee0d
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_alpha.deb
df> Size/MD5 checksum: 376370 d20d19e5fa8943b80a1a5678044e578c
df> AMD64 architecture:
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_amd64.deb
df> Size/MD5 checksum: 89052 8ff0a34a1fca0e232edcee6827233760
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_amd64.deb
df> Size/MD5 checksum: 341854 44f25a0b80eb783aa1c8f6a971ca237d
df> ARM architecture:
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_arm.deb
df> Size/MD5 checksum: 89788 d5378073f43820e820d5abfab4ea19ac
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_arm.deb
df> Size/MD5 checksum: 325002 fc60192e280377c8d802827fb35e9ccf
df> HP Precision architecture:
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_hppa.deb
df> Size/MD5 checksum: 93882 6a44a4a6f99bd607c47b993eb02ede0a
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_hppa.deb
df> Size/MD5 checksum: 354128 130b95fb7d817148acc080b87d650033
df> Intel IA-32 architecture:
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_i386.deb
df> Size/MD5 checksum: 84608 a5ae0d2e2a6c804a7bc28bd78b89b9a8
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_i386.deb
df> Size/MD5 checksum: 329946 ecf6c9f4b86fa32b24ef7d395ec786bc
df> Intel IA-64 architecture:
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_ia64.deb
df> Size/MD5 checksum: 113136 8bda8ebe0253f6a122ed55ae5594061c
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_ia64.deb
df> Size/MD5 checksum: 467976 f10fd34a1511d2115429a07aa66c9505
df> Big endian MIPS architecture:
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_mips.deb
df> Size/MD5 checksum: 89766 66e65d7dd8997376ec87419b9e578635
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_mips.deb
df> Size/MD5 checksum: 344828 091f455c5364c6e086ccf3bab88b118d
df> Little endian MIPS architecture:
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_mipsel.deb
df> Size/MD5 checksum: 90078 23c815af2dd3b8caafbf51a36cc10f7e
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_mipsel.deb
df> Size/MD5 checksum: 346628 c31717b5c9d124fb762dd6bff3f05179
df> PowerPC architecture:
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_powerpc.deb
df> Size/MD5 checksum: 90846 a90d219725f00bb471e50b959dba126a
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_powerpc.deb
df> Size/MD5 checksum: 336966 cfe0376c21ac35af5ece94222a4d1642
df> IBM S/390 architecture:
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_s390.deb
df> Size/MD5 checksum: 90524 d51eafa7b1a6148c3cf81bfbe9dd512e
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_s390.deb
df> Size/MD5 checksum: 341322 888ca59e56b0aec906d7e1dfb854c2f9
df> Sun Sparc architecture:
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_sparc.deb
df> Size/MD5 checksum: 85938 57cff108c12ce7b3783a7e905e8afceb
df>
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_sparc.deb
df> Size/MD5 checksum: 318274 c2f8458fa25cd0b0b1857bcd3a6d827b
df> These files will probably be moved into the stable distribution on
df> its next update.
df> -
df> ----------------------------------------------------------------------------------
df> For apt-get: deb http://security.debian.org/ stable/updates main
df> For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
df> Mailing list: debian-security-announce@...ts.debian.org
df> Package info: `apt-cache show <pkg>' and
df> http://packages.debian.org/<pkg>
df> -----BEGIN PGP SIGNATURE-----
df> Version: GnuPG v1.4.6 (GNU/Linux)
df> iD8DBQFGaEU7huANDBmkLRkRAtVOAJ9G5dNX9JyzklUMCxCpcCPJ5frr8wCdH9U5
df> 6q7ng9jVMSwJEDZBjT7ykKw=
df> =AF46
df> -----END PGP SIGNATURE-----
--
~/ZARAZA http://securityvulns.com/
Powered by blists - more mailing lists