- ------------------------------------------------------------------------- Debian Security Advisory DSA-2964-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso June 21, 2014 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : iodine CVE ID : CVE-2014-4168 Debian Bug : 751834 Oscar Reparaz discovered an authentication bypass vulnerability in iodine, a tool for tunneling IPv4 data through a DNS server. A remote attacker could provoke a server to accept the rest of the setup or also network traffic by exploiting this flaw. For the stable distribution (wheezy), this problem has been fixed in version 0.6.0~rc1-12+deb7u1. For the testing distribution (jessie), this problem has been fixed in version 0.6.0~rc1-19. For the unstable distribution (sid), this problem has been fixed in version 0.6.0~rc1-19. We recommend that you upgrade your iodine packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org