SCIENTIFIC-LINUX-ERRATA Archives

March 2011

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Troy Dawson <[log in to unmask]>
Reply To:
Troy Dawson <[log in to unmask]>
Date:
Thu, 3 Mar 2011 15:52:02 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (34 lines)
Synopsis:	Moderate: openswan security update
Issue date:	2010-11-16
CVE Names:	CVE-2010-3302 CVE-2010-3308 CVE-2010-3752
                   CVE-2010-3753

Two buffer overflow flaws were found in the Openswan client-side XAUTH
handling code used when connecting to certain Cisco gateways. A 
malicious or compromised VPN gateway could use these flaws to execute 
arbitrary code on the connecting Openswan client. (CVE-2010-3302, 
CVE-2010-3308)

Two input sanitization flaws were found in the Openswan client-side
handling of Cisco gateway banners. A malicious or compromised VPN 
gateway could use these flaws to execute arbitrary code on the 
connecting Openswan client. (CVE-2010-3752, CVE-2010-3753)

After installing this update, the ipsec service will be restarted 
automatically.


SL 6.x

      SRPMS:
openswan-2.6.24-8.el6_0.1.src.rpm
      i386:
openswan-2.6.24-8.el6_0.1.i686.rpm
openswan-doc-2.6.24-8.el6_0.1.i686.rpm
      x86_64:
openswan-2.6.24-8.el6_0.1.x86_64.rpm
openswan-doc-2.6.24-8.el6_0.1.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2