Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2015:1227-1

Опубликовано: 14 мая 2014
Источник: suse-cvrf

Описание

Security update for strongswan

This update fixes a NULL ptr dereference (DoS) via ID_DER_ASN1_DN ID payloads.

Security Issue reference:

* CVE-2014-2891 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2891>

Список пакетов

SUSE Linux Enterprise Desktop 11 SP3
strongswan-4.4.0-6.25.1
strongswan-doc-4.4.0-6.25.1
SUSE Linux Enterprise Server 11 SP3
strongswan-4.4.0-6.25.1
strongswan-doc-4.4.0-6.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA
strongswan-4.4.0-6.25.1
strongswan-doc-4.4.0-6.25.1
SUSE Linux Enterprise Server for SAP Applications 11 SP3
strongswan-4.4.0-6.25.1
strongswan-doc-4.4.0-6.25.1

Описание

strongSwan 4.3.5 through 5.0.3, when using the OpenSSL plugin for ECDSA signature verification, allows remote attackers to authenticate as other users via an invalid signature.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:strongswan-4.4.0-6.25.1
SUSE Linux Enterprise Desktop 11 SP3:strongswan-doc-4.4.0-6.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:strongswan-4.4.0-6.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:strongswan-doc-4.4.0-6.25.1

Ссылки

Описание

The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:strongswan-4.4.0-6.25.1
SUSE Linux Enterprise Desktop 11 SP3:strongswan-doc-4.4.0-6.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:strongswan-4.4.0-6.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:strongswan-doc-4.4.0-6.25.1

Ссылки

Описание

IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:strongswan-4.4.0-6.25.1
SUSE Linux Enterprise Desktop 11 SP3:strongswan-doc-4.4.0-6.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:strongswan-4.4.0-6.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:strongswan-doc-4.4.0-6.25.1

Ссылки

Описание

strongSwan before 5.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a crafted ID_DER_ASN1_DN ID payload.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:strongswan-4.4.0-6.25.1
SUSE Linux Enterprise Desktop 11 SP3:strongswan-doc-4.4.0-6.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:strongswan-4.4.0-6.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:strongswan-doc-4.4.0-6.25.1

Ссылки

Описание

strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:strongswan-4.4.0-6.25.1
SUSE Linux Enterprise Desktop 11 SP3:strongswan-doc-4.4.0-6.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:strongswan-4.4.0-6.25.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:strongswan-doc-4.4.0-6.25.1

Ссылки