SuSE: 2005-020: ipsec-tools remote denial of service Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SUSE Security Announcement
Package: ipsec-tools
Announcement-ID: SUSE-SA:2005:020
Date: Thu, 31 Mar 2005 13:00:00 +0000
Affected products: 9.1, 9.2
SUSE Linux Enterprise Server 9
Novell Linux Desktop 9
Vulnerability Type: remote denial of service
Severity (1-10): 6
SUSE default package: no
Cross References: CAN-2005-0398
Content of this advisory:
1) security vulnerability resolved:
security problems in racoon
problem description
2) solution/workaround
3) special instructions and notes
4) package location and checksums
5) pending vulnerabilities, solutions, workarounds:
none
6) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion
Racoon is a ISAKMP key management daemon used in IPsec setups.
Sebastian Krahmer of the SUSE Security Team audited the daemon and
found that it handles certain ISAKMP messages in a slightly wrong way,
so that remote attackers can crash it via malformed ISAKMP packages.
This update fixes this problem.
This is tracked by the Mitre CVE ID CAN-2005-0398.
2) solution/workaround
None. Please install the updated packages.
3) special instructions and notes
Please restart the ipsec daemon, by running as root:
/usr/sbin/rcracoon try-restart
4) package location and checksums
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
x86 Platform:
SUSE Linux 9.2:
396fbabba87d4da66d0a5a8bf004061a
SUSE Linux 9.1:
a2b518867110fcb0a386472d0cfc76d7
source rpm(s):
177a7c30baeba235ae6feeb89c962153
x86-64 Platform:
SUSE Linux 9.2:
a4182f836f5c4af6b2fb57da4c57c134
source rpm(s):
7f396a2b8bfb0f99f9dede830e9ba168
SUSE Linux 9.1:
fd1eb56dcad51c50944bb3a10ee3f23b
source rpm(s):
a2a311f0e24759afa7ba3412631cf83a
______________________________________________________________________________
5) Pending vulnerabilities in SUSE Distributions and Workarounds:
none
______________________________________________________________________________
6) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References