lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1977982147.20070611141810@SECURITY.NNOV.RU>
Date: Mon, 11 Jun 2007 14:18:10 +0400
From: 3APA3A <3APA3A@...URITY.NNOV.RU>
To: dann frazier <dannf@...ian.org>
Cc: bugtraq@...urityfocus.com, listadmin@...URITYFOCUS.COM
Subject: Re: [SECURITY] [DSA 1299-1] New ipsec-tools packages fix denial of service

Dear dann frazier,


 Can you please provide valid CVE for this advisory, if any?

 CVE-2007-2524  is  Cross-site scripting (XSS) vulnerability in index.pl
 in  OTRS  (Open Ticket Request System) 2.0.x allows remote attackers to
 inject  arbitrary  web script or HTML via the Subaction parameter in an
 AgentTicketMailbox Action.


--Thursday, June 7, 2007, 9:52:59 PM, you wrote to bugtraq@...urityfocus.com:

df> -----BEGIN PGP SIGNED MESSAGE-----
df> Hash: SHA1

df> -
df> ---------------------------------------------------------------------------
df> Debian Security Advisory DSA 1299-1                    security@...ian.org
df> http://www.debian.org/security/                               dann frazier
df> June 7th, 2007                         
df> http://www.debian.org/security/faq
df> -
df> ---------------------------------------------------------------------------

df> Package        : ipsec-tools
df> Vulnerability  : missing input sanitising
df> Problem-Type   : remote
df> Debian-specific: no
df> CVE ID         : CVE-2007-2524


df> It was discovered that a specially-crafted packet sent to the racoon
df> ipsec key exchange server could cause a tunnel to crash, resulting in
df> a denial of service.

df> The oldstable distribution (sarge) isn't affected by this problem.

df> For the stable distribution (etch) this problem has been fixed in
df> version 1:0.6.6-3.1.

df> The unstable distribution (sid) will be fixed soon.

df> We recommend that you upgrade your racoon package.


df> Upgrade Instructions
df> - ---------------------

df> wget url
df>         will fetch the file for you
df> dpkg -i file.deb
df>         will install the referenced file.

df> If you are using the apt-get package manager, use the line for
df> sources.list as given below:

df> apt-get update
df>         will update the internal database
df> apt-get upgrade
df>         will install corrected packages

df> You may use an automated update by adding the resources from the
df> footer to the proper configuration.


df> Debian GNU/Linux 4.0 alias etch
df> - --------------------------------

df>   Source archives:

df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1.dsc
df>       Size/MD5 checksum:      714 8b0036099ce66a7cbe83e54d0b904af2
df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1.diff.gz
df>       Size/MD5 checksum:    49981 087edd1d11957b09b2171900a9b11861
df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6.orig.tar.gz
df>       Size/MD5 checksum:   914807 643a238e17148d242c603c511e28d029

df>   Alpha architecture:

df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_alpha.deb
df>       Size/MD5 checksum:    97060 2532ce5a61a9ddda86d2dc2b6c2fee0d
df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_alpha.deb
df>       Size/MD5 checksum:   376370 d20d19e5fa8943b80a1a5678044e578c

df>   AMD64 architecture:

df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_amd64.deb
df>       Size/MD5 checksum:    89052 8ff0a34a1fca0e232edcee6827233760
df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_amd64.deb
df>       Size/MD5 checksum:   341854 44f25a0b80eb783aa1c8f6a971ca237d

df>   ARM architecture:

df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_arm.deb
df>       Size/MD5 checksum:    89788 d5378073f43820e820d5abfab4ea19ac
df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_arm.deb
df>       Size/MD5 checksum:   325002 fc60192e280377c8d802827fb35e9ccf

df>   HP Precision architecture:

df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_hppa.deb
df>       Size/MD5 checksum:    93882 6a44a4a6f99bd607c47b993eb02ede0a
df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_hppa.deb
df>       Size/MD5 checksum:   354128 130b95fb7d817148acc080b87d650033

df>   Intel IA-32 architecture:

df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_i386.deb
df>       Size/MD5 checksum:    84608 a5ae0d2e2a6c804a7bc28bd78b89b9a8
df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_i386.deb
df>       Size/MD5 checksum:   329946 ecf6c9f4b86fa32b24ef7d395ec786bc

df>   Intel IA-64 architecture:

df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_ia64.deb
df>       Size/MD5 checksum:   113136 8bda8ebe0253f6a122ed55ae5594061c
df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_ia64.deb
df>       Size/MD5 checksum:   467976 f10fd34a1511d2115429a07aa66c9505

df>   Big endian MIPS architecture:

df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_mips.deb
df>       Size/MD5 checksum:    89766 66e65d7dd8997376ec87419b9e578635
df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_mips.deb
df>       Size/MD5 checksum:   344828 091f455c5364c6e086ccf3bab88b118d

df>   Little endian MIPS architecture:

df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_mipsel.deb
df>       Size/MD5 checksum:    90078 23c815af2dd3b8caafbf51a36cc10f7e
df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_mipsel.deb
df>       Size/MD5 checksum:   346628 c31717b5c9d124fb762dd6bff3f05179

df>   PowerPC architecture:

df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_powerpc.deb
df>       Size/MD5 checksum:    90846 a90d219725f00bb471e50b959dba126a
df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_powerpc.deb
df>       Size/MD5 checksum:   336966 cfe0376c21ac35af5ece94222a4d1642

df>   IBM S/390 architecture:

df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_s390.deb
df>       Size/MD5 checksum:    90524 d51eafa7b1a6148c3cf81bfbe9dd512e
df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_s390.deb
df>       Size/MD5 checksum:   341322 888ca59e56b0aec906d7e1dfb854c2f9

df>   Sun Sparc architecture:

df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_sparc.deb
df>       Size/MD5 checksum:    85938 57cff108c12ce7b3783a7e905e8afceb
df>    
df> http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_sparc.deb
df>       Size/MD5 checksum:   318274 c2f8458fa25cd0b0b1857bcd3a6d827b

df>   These files will probably be moved into the stable distribution on
df>   its next update.

df> -
df> ----------------------------------------------------------------------------------
df> For apt-get: deb http://security.debian.org/ stable/updates main
df> For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
df> Mailing list: debian-security-announce@...ts.debian.org
df> Package info: `apt-cache show <pkg>' and
df> http://packages.debian.org/<pkg>
df> -----BEGIN PGP SIGNATURE-----
df> Version: GnuPG v1.4.6 (GNU/Linux)

df> iD8DBQFGaEU7huANDBmkLRkRAtVOAJ9G5dNX9JyzklUMCxCpcCPJ5frr8wCdH9U5
df> 6q7ng9jVMSwJEDZBjT7ykKw=
df> =AF46
df> -----END PGP SIGNATURE-----



-- 
~/ZARAZA http://securityvulns.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ