From Mageia wiki
Jump to: navigation, search

MGASA-2012-0300

Date: October 20th, 2012
Affected releases: 1, 2


Description:
Updated openswan packages fix security vulnerabilities:

Two buffer overflow flaws were found in the Openswan client-side XAUTH
handling code used when connecting to certain Cisco gateways. A malicious
or compromised VPN gateway could use these flaws to execute arbitrary code
on the connecting Openswan client (CVE-2010-3302, CVE-2010-3308).

Two input sanitization flaws were found in the Openswan client-side
handling of Cisco gateway banners. A malicious or compromised VPN gateway
could use these flaws to execute arbitrary code on the connecting Openswan
client (CVE-2010-3752, CVE-2010-3753).

A use-after-free flaw was found in the way Openswan's pluto IKE daemon used
cryptographic helpers. A remote, authenticated attacker could send a
specially-crafted IKE packet that would crash the pluto daemon. This issue
only affected SMP (symmetric multiprocessing) systems that have the
cryptographic helpers enabled (CVE-2011-4073).


Updated Packages:
Mageia 1:
openswan-2.6.28-2.1.mga1
openswan-doc-2.6.28-2.1.mga1

Mageia 2:
openswan-2.6.28-2.1.mga2
openswan-doc-2.6.28-2.1.mga2


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3302
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3308
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3752
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3753
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4073
https://rhn.redhat.com/errata/RHSA-2010-0892.html
http://rhn.redhat.com/errata/RHSA-2011-1422.html
https://bugs.mageia.org/show_bug.cgi?id=7095