Fedora Core 3 Update: openswan-2.1.5-2.FC3.1

    Date28 Jan 2005
    CategoryFedora
    6706
    Posted ByJoe Shakespeare
    This erratum fixes the remote exploitation of a stack based buffer overflow vulnerability in Xelerance Corp.'s Openswan, which could allow attackers to execute arbitrary code.
    ---------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2005-082
    2005-01-28
    ---------------------------------------------------------------------
    
    Product     : Fedora Core 3
    Name        : openswan
    Version     : 2.1.5
    Release     : 2.FC3.1
    Summary     : Openswan IPsec userland tools
    Description :
    Openswan is a free implementation of IPSEC & IKE for Linux.
    
    IPsec is Internet Protocol Security and uses strong cryptography to
    provide both authentication and encryption services.  These services
    allow you to build secure tunnels through untrusted networks.
    Everything passing through the untrusted net is encrypted by the ipsec
    gateway machine and decrypted by the gateway at the other end of the
    tunnel.  The resulting tunnel is a virtual private network or VPN.
    
    This package contains the daemons and userland tools for setting up
    Openswan on a kernel with the 2.6 native IPsec code.
    
    ---------------------------------------------------------------------
    Update Information:
    This erratum fixes the remote exploitation of a stack based buffer
    overflow vulnerability in Xelerance Corp.'s Openswan, which could
    allow attackers to execute arbitrary code.
    
    The vulnerability specifically exists due to a lack of bounds checking
    in the pluto application when Openswan is compiled with XAUTH and PAM
    support.
    
    The Common Vulnerabilities and Exposures project has assigned
    the name CAN-2005-0162 to this problem.
    
    ---------------------------------------------------------------------
    * Tue Dec 27 2005 Harald Hoyer  - 2.1.5-2.FC3.1
    
    - fixed possible xauth/PAM buffer overflow. (bug 146287)
    
    
    ---------------------------------------------------------------------
    This update can be downloaded from:
       http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/
    
    08083949eee57eb9b8417729fc160e57  SRPMS/openswan-2.1.5-2.FC3.1.src.rpm
    6df7139465807a325eacbe065a35ef67  x86_64/openswan-2.1.5-2.FC3.1.x86_64.rpm
    eab7fef76f737dd0ef5c4527656958c0  x86_64/debug/openswan-debuginfo-2.1.5-2.FC3.1.x86_64.rpm
    9ee8446d2ba7f7dbca2c5213b30e9393  i386/openswan-2.1.5-2.FC3.1.i386.rpm
    ef5fec6a769017a1e726c95129286b9c  i386/debug/openswan-debuginfo-2.1.5-2.FC3.1.i386.rpm
    
    This update can also be installed with the Update Agent; you can
    launch the Update Agent with the 'up2date' command.
    ---------------------------------------------------------------------
    
    --
    fedora-announce-list mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.redhat.com/mailman/listinfo/fedora-announce-list
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"67","type":"x","order":"1","pct":57.76,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":12.93,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"34","type":"x","order":"3","pct":29.31,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.