SCIENTIFIC-LINUX-ERRATA Archives

May 2013

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Wed, 15 May 2013 19:18:59 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (42 lines)
Synopsis:          Important: openswan security update
Advisory ID:       SLSA-2013:0827-1
Issue Date:        2013-05-15
CVE Numbers:       CVE-2013-2053
--

A buffer overflow flaw was found in Openswan. If Opportunistic Encryption
were enabled ("oe=yes" in "/etc/ipsec.conf") and an RSA key configured, an
attacker able to cause a system to perform a DNS lookup for an attacker-
controlled domain containing malicious records (such as by sending an
email that triggers a DKIM or SPF DNS record lookup) could cause
Openswan's pluto IKE daemon to crash or, potentially, execute arbitrary
code with root privileges. With "oe=yes" but no RSA key configured, the
issue can only be triggered by attackers on the local network who can
control the reverse DNS entry of the target system. Opportunistic
Encryption is disabled by default. (CVE-2013-2053)

After installing this update, the ipsec service will be restarted
automatically.
--

SL5
  x86_64
    openswan-2.6.32-5.el5_9.x86_64.rpm
    openswan-debuginfo-2.6.32-5.el5_9.x86_64.rpm
    openswan-doc-2.6.32-5.el5_9.x86_64.rpm
  i386
    openswan-2.6.32-5.el5_9.i386.rpm
    openswan-debuginfo-2.6.32-5.el5_9.i386.rpm
    openswan-doc-2.6.32-5.el5_9.i386.rpm
SL6
  x86_64
    openswan-2.6.32-20.el6_4.x86_64.rpm
    openswan-debuginfo-2.6.32-20.el6_4.x86_64.rpm
    openswan-doc-2.6.32-20.el6_4.x86_64.rpm
  i386
    openswan-2.6.32-20.el6_4.i686.rpm
    openswan-debuginfo-2.6.32-20.el6_4.i686.rpm
    openswan-doc-2.6.32-20.el6_4.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2