[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 1299-1] New ipsec-tools packages fix denial of service



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------------
Debian Security Advisory DSA 1299-1                    security@debian.org
http://www.debian.org/security/                               dann frazier
June 7th, 2007                          http://www.debian.org/security/faq
- ---------------------------------------------------------------------------

Package        : ipsec-tools
Vulnerability  : missing input sanitising
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2007-2524


It was discovered that a specially-crafted packet sent to the racoon
ipsec key exchange server could cause a tunnel to crash, resulting in
a denial of service.

The oldstable distribution (sarge) isn't affected by this problem.

For the stable distribution (etch) this problem has been fixed in
version 1:0.6.6-3.1.

The unstable distribution (sid) will be fixed soon.

We recommend that you upgrade your racoon package.


Upgrade Instructions
- ---------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1.dsc
      Size/MD5 checksum:      714 8b0036099ce66a7cbe83e54d0b904af2
    http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1.diff.gz
      Size/MD5 checksum:    49981 087edd1d11957b09b2171900a9b11861
    http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6.orig.tar.gz
      Size/MD5 checksum:   914807 643a238e17148d242c603c511e28d029

  Alpha architecture:

    http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_alpha.deb
      Size/MD5 checksum:    97060 2532ce5a61a9ddda86d2dc2b6c2fee0d
    http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_alpha.deb
      Size/MD5 checksum:   376370 d20d19e5fa8943b80a1a5678044e578c

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_amd64.deb
      Size/MD5 checksum:    89052 8ff0a34a1fca0e232edcee6827233760
    http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_amd64.deb
      Size/MD5 checksum:   341854 44f25a0b80eb783aa1c8f6a971ca237d

  ARM architecture:

    http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_arm.deb
      Size/MD5 checksum:    89788 d5378073f43820e820d5abfab4ea19ac
    http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_arm.deb
      Size/MD5 checksum:   325002 fc60192e280377c8d802827fb35e9ccf

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_hppa.deb
      Size/MD5 checksum:    93882 6a44a4a6f99bd607c47b993eb02ede0a
    http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_hppa.deb
      Size/MD5 checksum:   354128 130b95fb7d817148acc080b87d650033

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_i386.deb
      Size/MD5 checksum:    84608 a5ae0d2e2a6c804a7bc28bd78b89b9a8
    http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_i386.deb
      Size/MD5 checksum:   329946 ecf6c9f4b86fa32b24ef7d395ec786bc

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_ia64.deb
      Size/MD5 checksum:   113136 8bda8ebe0253f6a122ed55ae5594061c
    http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_ia64.deb
      Size/MD5 checksum:   467976 f10fd34a1511d2115429a07aa66c9505

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_mips.deb
      Size/MD5 checksum:    89766 66e65d7dd8997376ec87419b9e578635
    http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_mips.deb
      Size/MD5 checksum:   344828 091f455c5364c6e086ccf3bab88b118d

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_mipsel.deb
      Size/MD5 checksum:    90078 23c815af2dd3b8caafbf51a36cc10f7e
    http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_mipsel.deb
      Size/MD5 checksum:   346628 c31717b5c9d124fb762dd6bff3f05179

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_powerpc.deb
      Size/MD5 checksum:    90846 a90d219725f00bb471e50b959dba126a
    http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_powerpc.deb
      Size/MD5 checksum:   336966 cfe0376c21ac35af5ece94222a4d1642

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_s390.deb
      Size/MD5 checksum:    90524 d51eafa7b1a6148c3cf81bfbe9dd512e
    http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_s390.deb
      Size/MD5 checksum:   341322 888ca59e56b0aec906d7e1dfb854c2f9

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_sparc.deb
      Size/MD5 checksum:    85938 57cff108c12ce7b3783a7e905e8afceb
    http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_sparc.deb
      Size/MD5 checksum:   318274 c2f8458fa25cd0b0b1857bcd3a6d827b

  These files will probably be moved into the stable distribution on
  its next update.

- ----------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGaEU7huANDBmkLRkRAtVOAJ9G5dNX9JyzklUMCxCpcCPJ5frr8wCdH9U5
6q7ng9jVMSwJEDZBjT7ykKw=
=AF46
-----END PGP SIGNATURE-----



Reply to: