Debian: New isakmpd packages fix replay protection bypass

    Date13 Sep 2006
    CategoryDebian
    2415
    Posted ByLinuxSecurity Advisories
    A flaw has been found in isakmpd, OpenBSD's implementation of the Internet Key Exchange protocol, that caused Security Associations to be created with a replay window of 0 when isakmpd was acting as the responder during SA negotiation. This could allow an attacker to re-inject sniffed IPsec packets, which would not be checked against the replay counter.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1175-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                             Noah Meyerhans
    September 13th, 2006                    http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : isakmpd
    Vulnerability  : programming error
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CVE-2006-4436
    BugTraq ID     : 19712
    Debian Bug     : 385894
    
    A flaw has been found in isakmpd, OpenBSD's implementation of the
    Internet Key Exchange protocol, that caused Security Associations to be
    created with a replay window of 0 when isakmpd was acting as the
    responder during SA negotiation.  This could allow an attacker to
    re-inject sniffed IPsec packets, which would not be checked against the
    replay counter.
    
    For the stable distribution (sarge) this problem has been fixed in
    version 20041012-1sarge1
    
    For the unstable distribution (sid) this problem has been fixed in
    version 20041012-4
    
    We recommend that you upgrade your isakmpd package.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1.dsc
          Size/MD5 checksum:      661 35e8865c2759c66f01c0563a4bdfc124
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1.diff.gz
          Size/MD5 checksum:    68877 90e47af5080893c9ccf7d38aebef6760
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012.orig.tar.gz
          Size/MD5 checksum:   373941 e6d25a9e232fb186e1a48dc06453bd57
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_alpha.deb
          Size/MD5 checksum:   708414 e6894a5a6c7a4586f2c22d28cd0a8f84
    
      AMD64 architecture:
    
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_amd64.deb
          Size/MD5 checksum:   544652 43df55b5251b4cbb2bf3c4fe3528827f
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_arm.deb
          Size/MD5 checksum:   473492 92e5b4ae0fbbb14104d39fe0b1a24597
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_hppa.deb
          Size/MD5 checksum:   535124 d97d6a0357c332c72a8ac313a7f1c301
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_i386.deb
          Size/MD5 checksum:   497670 0a58ae7ef43c38853a58d430389d1840
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_ia64.deb
          Size/MD5 checksum:   786026 f8e473ef442260b13076aa6add875c99
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_m68k.deb
          Size/MD5 checksum:   421268 3f57254cfdded5e2615f4c3b277133e9
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_mips.deb
          Size/MD5 checksum:   568914 cf14999a58edbb20545d8a63f7311f87
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_mipsel.deb
          Size/MD5 checksum:   567060 38fca5d17f6be2c843f92aed15ac3830
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_powerpc.deb
          Size/MD5 checksum:   555978 f3786f6d0f4e556587b372a753184cca
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_s390.deb
          Size/MD5 checksum:   548240 e9cbc0d97b19aac56686d7384de1c219
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/i/isakmpd/isakmpd_20041012-1sarge1_sparc.deb
          Size/MD5 checksum:   514166 7318cf5d5f419d5d00b45faf6d5bc3e1
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"65","type":"x","order":"1","pct":57.52,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.27,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.2,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.