Executive Summary
Summary | |
---|---|
Title | openswan security update |
Informations | |||
---|---|---|---|
Name | RHSA-2011:1422 | First vendor Publication | 2011-11-02 |
Vendor | RedHat | Last vendor Modification | 2011-11-02 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 4 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated openswan packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Openswan is a free implementation of Internet Protocol Security (IPsec) and Internet Key Exchange (IKE). IPsec uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks. A use-after-free flaw was found in the way Openswan's pluto IKE daemon used cryptographic helpers. A remote, authenticated attacker could send a specially-crafted IKE packet that would crash the pluto daemon. This issue only affected SMP (symmetric multiprocessing) systems that have the cryptographic helpers enabled. The helpers are disabled by default on Red Hat Enterprise Linux 5, but enabled by default on Red Hat Enterprise Linux |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2011-1422.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:15120 | |||
Oval ID: | oval:org.mitre.oval:def:15120 | ||
Title: | DSA-2374-1 openswan -- implementation error | ||
Description: | The information security group at ETH Zurich discovered a denial of service vulnerability in the crypto helper handler of the IKE daemon pluto | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2374-1 CVE-2011-4073 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | openswan |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21544 | |||
Oval ID: | oval:org.mitre.oval:def:21544 | ||
Title: | RHSA-2011:1422: openswan security update (Moderate) | ||
Description: | Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:1422-01 CESA-2011:1422 CVE-2011-4073 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 5 CentOS Linux 5 CentOS Linux 6 | Product(s): | openswan |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23264 | |||
Oval ID: | oval:org.mitre.oval:def:23264 | ||
Title: | DEPRECATED: ELSA-2011:1422: openswan security update (Moderate) | ||
Description: | Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:1422-01 CVE-2011-4073 | Version: | 7 |
Platform(s): | Oracle Linux 6 Oracle Linux 5 | Product(s): | openswan |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23495 | |||
Oval ID: | oval:org.mitre.oval:def:23495 | ||
Title: | ELSA-2011:1422: openswan security update (Moderate) | ||
Description: | Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:1422-01 CVE-2011-4073 | Version: | 6 |
Platform(s): | Oracle Linux 6 Oracle Linux 5 | Product(s): | openswan |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28165 | |||
Oval ID: | oval:org.mitre.oval:def:28165 | ||
Title: | DEPRECATED: ELSA-2011-1422 -- openswan security update (moderate) | ||
Description: | [2.6.32-4.4] Resolves: #748969 CVE-2011-4073 updated patch by upstream [2.6.32-4.3] Resolves: #748969 CVE-2011-4073 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-1422 CVE-2011-4073 | Version: | 4 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | openswan |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-07-30 | Name : CentOS Update for openswan CESA-2011:1422 centos5 x86_64 File : nvt/gb_CESA-2011_1422_openswan_centos5_x86_64.nasl |
2012-04-30 | Name : Gentoo Security Advisory GLSA 201203-13 (Openswan) File : nvt/glsa_201203_13.nasl |
2012-04-02 | Name : Fedora Update for openswan FEDORA-2011-15196 File : nvt/gb_fedora_2011_15196_openswan_fc16.nasl |
2012-02-11 | Name : Debian Security Advisory DSA 2374-1 (openswan) File : nvt/deb_2374_1.nasl |
2011-12-12 | Name : Fedora Update for openswan FEDORA-2011-15077 File : nvt/gb_fedora_2011_15077_openswan_fc15.nasl |
2011-12-12 | Name : Fedora Update for openswan FEDORA-2011-15127 File : nvt/gb_fedora_2011_15127_openswan_fc14.nasl |
2011-11-03 | Name : CentOS Update for openswan CESA-2011:1422 centos5 i386 File : nvt/gb_CESA-2011_1422_openswan_centos5_i386.nasl |
2011-11-03 | Name : RedHat Update for openswan RHSA-2011:1422-01 File : nvt/gb_RHSA-2011_1422-01_openswan.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
76725 | Openswan Uuse-after-free Crypto Helper Handler ISAKMP Phase 1 Authentication ... |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-01-28 | Name : The remote host is affected by a remote denial of service vulnerability. File : openswan_ike_50440.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2011-18.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1422.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111102_openswan_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-03-19 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201203-13.nasl - Type : ACT_GATHER_INFO |
2012-01-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2374.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_openswan-111114.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_openswan-7836.nasl - Type : ACT_GATHER_INFO |
2011-12-12 | Name : The remote Fedora host is missing a security update. File : fedora_2011-15077.nasl - Type : ACT_GATHER_INFO |
2011-12-12 | Name : The remote Fedora host is missing a security update. File : fedora_2011-15127.nasl - Type : ACT_GATHER_INFO |
2011-12-12 | Name : The remote Fedora host is missing a security update. File : fedora_2011-15196.nasl - Type : ACT_GATHER_INFO |
2011-11-03 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-1422.nasl - Type : ACT_GATHER_INFO |
2011-11-03 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1422.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:55:15 |
|