Debian Security Advisory
DSA-104-1 cipe -- DoS attack
- Date Reported:
- 14 Jan 2002
- Affected Packages:
- cipe
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2002-0047.
- More information:
-
Larry McVoy found a bug in the packet handling code for the CIPE VPN package: it did not check if a received packet was too short and could crash.
This has been fixed in version 1.3.0-3, and we recommend that you upgrade your CIPE packages immediately.
Please note that the package only contains the required kernel patch, you will have to manually build the kernel modules for your kernel with the updated source from the
cipe-source
package. - Fixed in:
-
Debian GNU/Linux 2.2 (potato)
- Source:
- http://security.debian.org/dists/stable/updates/main/source/cipe_1.3.0-3.diff.gz
- http://security.debian.org/dists/stable/updates/main/source/cipe_1.3.0-3.dsc
- http://security.debian.org/dists/stable/updates/main/source/cipe_1.3.0.orig.tar.gz
- http://security.debian.org/dists/stable/updates/main/source/cipe_1.3.0-3.dsc
- Architecture-independent component:
- http://security.debian.org/dists/stable/updates/main/binary-all/cipe-common_1.3.0-3_all.deb
- http://security.debian.org/dists/stable/updates/main/binary-all/cipe-source_1.3.0-3_all.deb
- http://security.debian.org/dists/stable/updates/main/binary-all/cipe-source_1.3.0-3_all.deb
MD5 checksums of the listed files are available in the original advisory.