Debian Security Advisory

DSA-104-1 cipe -- DoS attack

Date Reported:
14 Jan 2002
Affected Packages:
cipe
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2002-0047.
More information:

Larry McVoy found a bug in the packet handling code for the CIPE VPN package: it did not check if a received packet was too short and could crash.

This has been fixed in version 1.3.0-3, and we recommend that you upgrade your CIPE packages immediately.

Please note that the package only contains the required kernel patch, you will have to manually build the kernel modules for your kernel with the updated source from the cipe-source package.

Fixed in:

Debian GNU/Linux 2.2 (potato)

Source:
http://security.debian.org/dists/stable/updates/main/source/cipe_1.3.0-3.diff.gz
http://security.debian.org/dists/stable/updates/main/source/cipe_1.3.0-3.dsc
http://security.debian.org/dists/stable/updates/main/source/cipe_1.3.0.orig.tar.gz
Architecture-independent component:
http://security.debian.org/dists/stable/updates/main/binary-all/cipe-common_1.3.0-3_all.deb
http://security.debian.org/dists/stable/updates/main/binary-all/cipe-source_1.3.0-3_all.deb

MD5 checksums of the listed files are available in the original advisory.