From Mageia wiki
Jump to: navigation, search

MGASA-2013-0157

Date: May 25th, 2013
Affected releases: 2, 3
Media: Core


Description:
Updated openswan packages fix security vulnerability:

A buffer overflow flaw was found in Openswan. If Opportunistic Encryption
were enabled ("oe=yes" in "/etc/ipsec.conf") and an RSA key configured,
an attacker able to cause a system to perform a DNS lookup for an
attacker-controlled domain containing malicious records (such as by
sending an email that triggers a DKIM or SPF DNS record lookup) could
cause Openswan's pluto IKE daemon to crash or, potentially, execute
arbitrary code with root privileges. With "oe=yes" but no RSA key
configured, the issue can only be triggered by attackers on the local
network who can control the reverse DNS entry of the target system.
Opportunistic Encryption is disabled by default (CVE-2013-2053).


Updated Packages:
Mageia 2:
i586:
openswan-2.6.28-2.2.mga2.i586.rpm
openswan-doc-2.6.28-2.2.mga2.i586.rpm

x86_64:
openswan-2.6.28-2.2.mga2.x86_64.rpm
openswan-doc-2.6.28-2.2.mga2.x86_64.rpm

SRPMS:
openswan-2.6.28-2.2.mga2.src.rpm


Mageia 3:
i586:
openswan-2.6.28-5.mga3.i586.rpm
openswan-doc-2.6.28-5.mga3.i586.rpm

x86_64:
openswan-2.6.28-5.mga3.x86_64.rpm
openswan-doc-2.6.28-5.mga3.x86_64.rpm

SRPMS:
openswan-2.6.28-5.mga3.src.rpm


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2053
https://rhn.redhat.com/errata/RHSA-2013-0827.html
https://bugs.mageia.org/show_bug.cgi?id=10126