Debian: DSA-3118-1: strongswan security update

    Date05 Jan 2015
    CategoryDebian
    39
    Posted ByLinuxSecurity Advisories
    Mike Daskalakis reported a denial of service vulnerability in charon, the IKEv2 daemon for strongSwan, an IKE/IPsec suite used to establish IPsec protected links.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3118-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                         Yves-Alexis Perez
    January 05, 2015                       http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : strongswan
    CVE ID         : CVE-2014-9221
    
    Mike Daskalakis reported a denial of service vulnerability in charon,
    the IKEv2 daemon for strongSwan, an IKE/IPsec suite used to establish
    IPsec protected links.
    
    The bug can be triggered by an IKEv2 Key Exchange (KE) payload that
    contains the Diffie-Hellman (DH) group 1025. This identifier is from the
    private-use range and only used internally by libtls for DH groups with
    custom generator and prime (MODP_CUSTOM). As such the instantiated
    method expects that these two values are passed to the constructor. This
    is not the case when a DH object is created based on the group in the KE
    payload. Therefore, an invalid pointer is dereferenced later, which
    causes a segmentation fault.
    
    This means that the charon daemon can be crashed with a single
    IKE_SA_INIT message containing such a KE payload. The starter process
    should restart the daemon after that, but this might increase load on
    the system. Remote code execution is not possible due to this issue, nor
    is IKEv1 affected in charon or pluto.
    
    For the stable distribution (wheezy), this problem has been fixed in
    version 4.5.2-1.5+deb7u6.
    
    For the upcoming stable distribution (jessie), this problem has been
    fixed in version 5.2.1-5.
    
    For the unstable distribution (sid), this problem has been fixed in
    version 5.2.1-5.
    
    We recommend that you upgrade your strongswan packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"13","type":"x","order":"1","pct":52,"resources":[]},{"id":"88","title":"Should be more technical","votes":"4","type":"x","order":"2","pct":16,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"8","type":"x","order":"3","pct":32,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.