- ---------------------------------------------------------------------                   Red Hat Security Advisory

Synopsis:          Moderate: ipsec-tools security update
Advisory ID:       RHSA-2006:0267-01
Advisory URL:      https://access.redhat.com/errata/RHSA-2006:0267.html
Issue date:        2006-04-25
Updated on:        2006-04-25
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2005-3732 
- ---------------------------------------------------------------------1. Summary:

Updated ipsec-tools packages that fix a bug in racoon are now available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The ipsec-tools package is used in conjunction with the IPsec functionality
in the linux kernel and includes racoon, an IKEv1 keying daemon.

A denial of service flaw was found in the ipsec-tools racoon daemon.  If a
victim's machine has racoon configured in a non-recommended insecure
manner, it is possible for a remote attacker to crash the racoon daemon. 
(CVE-2005-3732)

Users of ipsec-tools should upgrade to these updated packages, which contain
backported patches, and are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

173841 - CVE-2005-3732 ipsec-tools IKE DoS
181605 - CVE-2005-3732 ipsec-tools IKE DoS

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
947910c457600879145e041862e0bcb0  ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm

i386:
dbbb9bcc93832b082f98f9a1964ac0a3  ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm
ed7064025214d5de74c387b288720f92  ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm

ia64:
6c97ef7c2dfea1f077c37d3065645495  ipsec-tools-0.2.5-0.7.rhel3.3.ia64.rpm
10c71e7b356cc56b70091ca8a92e4cc2  ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ia64.rpm

ppc:
eb22e79ec0ccb8e546b612749963f5ee  ipsec-tools-0.2.5-0.7.rhel3.3.ppc.rpm
64f2341c9e12c8656597d4725b4412ab  ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ppc.rpm

s390:
7e20191320ddf9d230b75a8f63fe315e  ipsec-tools-0.2.5-0.7.rhel3.3.s390.rpm
aba15779dc0e46dc06346f7981fd2c20  ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.s390.rpm

s390x:
93892dbdb5c9d0d85ca65c6651655b19  ipsec-tools-0.2.5-0.7.rhel3.3.s390x.rpm
420c85900139807b487e65ccbd706979  ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.s390x.rpm

x86_64:
fb8b6c328d33ff990a016cd93f5b5c2e  ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm
8a342679a07240c4d8536cb5a24f3aee  ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
947910c457600879145e041862e0bcb0  ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm

i386:
dbbb9bcc93832b082f98f9a1964ac0a3  ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm
ed7064025214d5de74c387b288720f92  ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm

x86_64:
fb8b6c328d33ff990a016cd93f5b5c2e  ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm
8a342679a07240c4d8536cb5a24f3aee  ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
947910c457600879145e041862e0bcb0  ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm

i386:
dbbb9bcc93832b082f98f9a1964ac0a3  ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm
ed7064025214d5de74c387b288720f92  ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm

ia64:
6c97ef7c2dfea1f077c37d3065645495  ipsec-tools-0.2.5-0.7.rhel3.3.ia64.rpm
10c71e7b356cc56b70091ca8a92e4cc2  ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ia64.rpm

x86_64:
fb8b6c328d33ff990a016cd93f5b5c2e  ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm
8a342679a07240c4d8536cb5a24f3aee  ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
947910c457600879145e041862e0bcb0  ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm

i386:
dbbb9bcc93832b082f98f9a1964ac0a3  ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm
ed7064025214d5de74c387b288720f92  ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm

ia64:
6c97ef7c2dfea1f077c37d3065645495  ipsec-tools-0.2.5-0.7.rhel3.3.ia64.rpm
10c71e7b356cc56b70091ca8a92e4cc2  ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ia64.rpm

x86_64:
fb8b6c328d33ff990a016cd93f5b5c2e  ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm
8a342679a07240c4d8536cb5a24f3aee  ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
aed36ce0deb098bda284977fa2f9af04  ipsec-tools-0.3.3-6.rhel4.1.src.rpm

i386:
af514b3e19ce362c30f42c072751ca7c  ipsec-tools-0.3.3-6.rhel4.1.i386.rpm
5c38272ecadfdb30d398f5261888d358  ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm

ia64:
2f9fbde3de938d4f1ec7c437fb6c91e7  ipsec-tools-0.3.3-6.rhel4.1.ia64.rpm
d2d09077ed0ab1823eb5e1c511b530e5  ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ia64.rpm

ppc:
fb37df4b25abdda16d46e9ba78bf916c  ipsec-tools-0.3.3-6.rhel4.1.ppc.rpm
3e902ab84f03bcac0ee430bc26da46df  ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ppc.rpm

s390:
3bf00b8901eeb2a04f75d532ca3f4650  ipsec-tools-0.3.3-6.rhel4.1.s390.rpm
11b52a9258966efc8680382b2dc7c95b  ipsec-tools-debuginfo-0.3.3-6.rhel4.1.s390.rpm

s390x:
09de8693ab709c025a4cbf5d5b7acde3  ipsec-tools-0.3.3-6.rhel4.1.s390x.rpm
ad6c1dfc0a80088c2b469942bc8e7413  ipsec-tools-debuginfo-0.3.3-6.rhel4.1.s390x.rpm

x86_64:
7db930f40bb68f77de42997f4b43cff6  ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm
d43078b66bfb23feb80355b99568b2c2  ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
aed36ce0deb098bda284977fa2f9af04  ipsec-tools-0.3.3-6.rhel4.1.src.rpm

i386:
af514b3e19ce362c30f42c072751ca7c  ipsec-tools-0.3.3-6.rhel4.1.i386.rpm
5c38272ecadfdb30d398f5261888d358  ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm

x86_64:
7db930f40bb68f77de42997f4b43cff6  ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm
d43078b66bfb23feb80355b99568b2c2  ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
aed36ce0deb098bda284977fa2f9af04  ipsec-tools-0.3.3-6.rhel4.1.src.rpm

i386:
af514b3e19ce362c30f42c072751ca7c  ipsec-tools-0.3.3-6.rhel4.1.i386.rpm
5c38272ecadfdb30d398f5261888d358  ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm

ia64:
2f9fbde3de938d4f1ec7c437fb6c91e7  ipsec-tools-0.3.3-6.rhel4.1.ia64.rpm
d2d09077ed0ab1823eb5e1c511b530e5  ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ia64.rpm

x86_64:
7db930f40bb68f77de42997f4b43cff6  ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm
d43078b66bfb23feb80355b99568b2c2  ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
aed36ce0deb098bda284977fa2f9af04  ipsec-tools-0.3.3-6.rhel4.1.src.rpm

i386:
af514b3e19ce362c30f42c072751ca7c  ipsec-tools-0.3.3-6.rhel4.1.i386.rpm
5c38272ecadfdb30d398f5261888d358  ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm

ia64:
2f9fbde3de938d4f1ec7c437fb6c91e7  ipsec-tools-0.3.3-6.rhel4.1.ia64.rpm
d2d09077ed0ab1823eb5e1c511b530e5  ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ia64.rpm

x86_64:
7db930f40bb68f77de42997f4b43cff6  ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm
d43078b66bfb23feb80355b99568b2c2  ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3732
;forum_id=32000
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.

RedHat: Moderate: ipsec-tools security update

Updated ipsec-tools packages that fix a bug in racoon are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Summary



Summary

The ipsec-tools package is used in conjunction with the IPsec functionality in the linux kernel and includes racoon, an IKEv1 keying daemon. A denial of service flaw was found in the ipsec-tools racoon daemon. If a victim's machine has racoon configured in a non-recommended insecure manner, it is possible for a remote attacker to crash the racoon daemon. (CVE-2005-3732) Users of ipsec-tools should upgrade to these updated packages, which contain backported patches, and are not vulnerable to these issues.


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
173841 - CVE-2005-3732 ipsec-tools IKE DoS 181605 - CVE-2005-3732 ipsec-tools IKE DoS
6. RPMs required:
Red Hat Enterprise Linux AS version 3:
SRPMS: 947910c457600879145e041862e0bcb0 ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm
i386: dbbb9bcc93832b082f98f9a1964ac0a3 ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm ed7064025214d5de74c387b288720f92 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm
ia64: 6c97ef7c2dfea1f077c37d3065645495 ipsec-tools-0.2.5-0.7.rhel3.3.ia64.rpm 10c71e7b356cc56b70091ca8a92e4cc2 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ia64.rpm
ppc: eb22e79ec0ccb8e546b612749963f5ee ipsec-tools-0.2.5-0.7.rhel3.3.ppc.rpm 64f2341c9e12c8656597d4725b4412ab ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ppc.rpm
s390: 7e20191320ddf9d230b75a8f63fe315e ipsec-tools-0.2.5-0.7.rhel3.3.s390.rpm aba15779dc0e46dc06346f7981fd2c20 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.s390.rpm
s390x: 93892dbdb5c9d0d85ca65c6651655b19 ipsec-tools-0.2.5-0.7.rhel3.3.s390x.rpm 420c85900139807b487e65ccbd706979 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.s390x.rpm
x86_64: fb8b6c328d33ff990a016cd93f5b5c2e ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm 8a342679a07240c4d8536cb5a24f3aee ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm
Red Hat Desktop version 3:
SRPMS: 947910c457600879145e041862e0bcb0 ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm
i386: dbbb9bcc93832b082f98f9a1964ac0a3 ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm ed7064025214d5de74c387b288720f92 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm
x86_64: fb8b6c328d33ff990a016cd93f5b5c2e ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm 8a342679a07240c4d8536cb5a24f3aee ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS: 947910c457600879145e041862e0bcb0 ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm
i386: dbbb9bcc93832b082f98f9a1964ac0a3 ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm ed7064025214d5de74c387b288720f92 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm
ia64: 6c97ef7c2dfea1f077c37d3065645495 ipsec-tools-0.2.5-0.7.rhel3.3.ia64.rpm 10c71e7b356cc56b70091ca8a92e4cc2 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ia64.rpm
x86_64: fb8b6c328d33ff990a016cd93f5b5c2e ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm 8a342679a07240c4d8536cb5a24f3aee ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS: 947910c457600879145e041862e0bcb0 ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm
i386: dbbb9bcc93832b082f98f9a1964ac0a3 ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm ed7064025214d5de74c387b288720f92 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm
ia64: 6c97ef7c2dfea1f077c37d3065645495 ipsec-tools-0.2.5-0.7.rhel3.3.ia64.rpm 10c71e7b356cc56b70091ca8a92e4cc2 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ia64.rpm
x86_64: fb8b6c328d33ff990a016cd93f5b5c2e ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm 8a342679a07240c4d8536cb5a24f3aee ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm
Red Hat Enterprise Linux AS version 4:
SRPMS: aed36ce0deb098bda284977fa2f9af04 ipsec-tools-0.3.3-6.rhel4.1.src.rpm
i386: af514b3e19ce362c30f42c072751ca7c ipsec-tools-0.3.3-6.rhel4.1.i386.rpm 5c38272ecadfdb30d398f5261888d358 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm
ia64: 2f9fbde3de938d4f1ec7c437fb6c91e7 ipsec-tools-0.3.3-6.rhel4.1.ia64.rpm d2d09077ed0ab1823eb5e1c511b530e5 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ia64.rpm
ppc: fb37df4b25abdda16d46e9ba78bf916c ipsec-tools-0.3.3-6.rhel4.1.ppc.rpm 3e902ab84f03bcac0ee430bc26da46df ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ppc.rpm
s390: 3bf00b8901eeb2a04f75d532ca3f4650 ipsec-tools-0.3.3-6.rhel4.1.s390.rpm 11b52a9258966efc8680382b2dc7c95b ipsec-tools-debuginfo-0.3.3-6.rhel4.1.s390.rpm
s390x: 09de8693ab709c025a4cbf5d5b7acde3 ipsec-tools-0.3.3-6.rhel4.1.s390x.rpm ad6c1dfc0a80088c2b469942bc8e7413 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.s390x.rpm
x86_64: 7db930f40bb68f77de42997f4b43cff6 ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm d43078b66bfb23feb80355b99568b2c2 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: aed36ce0deb098bda284977fa2f9af04 ipsec-tools-0.3.3-6.rhel4.1.src.rpm
i386: af514b3e19ce362c30f42c072751ca7c ipsec-tools-0.3.3-6.rhel4.1.i386.rpm 5c38272ecadfdb30d398f5261888d358 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm
x86_64: 7db930f40bb68f77de42997f4b43cff6 ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm d43078b66bfb23feb80355b99568b2c2 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: aed36ce0deb098bda284977fa2f9af04 ipsec-tools-0.3.3-6.rhel4.1.src.rpm
i386: af514b3e19ce362c30f42c072751ca7c ipsec-tools-0.3.3-6.rhel4.1.i386.rpm 5c38272ecadfdb30d398f5261888d358 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm
ia64: 2f9fbde3de938d4f1ec7c437fb6c91e7 ipsec-tools-0.3.3-6.rhel4.1.ia64.rpm d2d09077ed0ab1823eb5e1c511b530e5 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ia64.rpm
x86_64: 7db930f40bb68f77de42997f4b43cff6 ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm d43078b66bfb23feb80355b99568b2c2 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: aed36ce0deb098bda284977fa2f9af04 ipsec-tools-0.3.3-6.rhel4.1.src.rpm
i386: af514b3e19ce362c30f42c072751ca7c ipsec-tools-0.3.3-6.rhel4.1.i386.rpm 5c38272ecadfdb30d398f5261888d358 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm
ia64: 2f9fbde3de938d4f1ec7c437fb6c91e7 ipsec-tools-0.3.3-6.rhel4.1.ia64.rpm d2d09077ed0ab1823eb5e1c511b530e5 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ia64.rpm
x86_64: 7db930f40bb68f77de42997f4b43cff6 ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm d43078b66bfb23feb80355b99568b2c2 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3732 ;forum_id=32000 http://www.redhat.com/security/updates/classification/#moderate

Package List


Severity
Advisory ID: RHSA-2006:0267-01
Advisory URL: https://access.redhat.com/errata/RHSA-2006:0267.html
Issued Date: : 2006-04-25
Updated on: 2006-04-25
Product: Red Hat Enterprise Linux
CVE Names: CVE-2005-3732 Updated ipsec-tools packages that fix a bug in racoon are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Topic


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64

Red Hat Desktop version 3 - i386, x86_64

Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64

Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64

Red Hat Enterprise Linux Desktop version 4 - i386, x86_64

Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64

Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64


Bugs Fixed


Related News