Synopsis: Moderate: openswan security update
Issue date: 2010-11-16
CVE Names: CVE-2010-3302 CVE-2010-3308 CVE-2010-3752
CVE-2010-3753
Two buffer overflow flaws were found in the Openswan client-side XAUTH
handling code used when connecting to certain Cisco gateways. A
malicious or compromised VPN gateway could use these flaws to execute
arbitrary code on the connecting Openswan client. (CVE-2010-3302,
CVE-2010-3308)
Two input sanitization flaws were found in the Openswan client-side
handling of Cisco gateway banners. A malicious or compromised VPN
gateway could use these flaws to execute arbitrary code on the
connecting Openswan client. (CVE-2010-3752, CVE-2010-3753)
After installing this update, the ipsec service will be restarted
automatically.
SL 6.x
SRPMS:
openswan-2.6.24-8.el6_0.1.src.rpm
i386:
openswan-2.6.24-8.el6_0.1.i686.rpm
openswan-doc-2.6.24-8.el6_0.1.i686.rpm
x86_64:
openswan-2.6.24-8.el6_0.1.x86_64.rpm
openswan-doc-2.6.24-8.el6_0.1.x86_64.rpm
-Connie Sieh
-Troy Dawson