Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: New ipsec-tools packages fix denial of service Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian It was discovered that a specially-crafted packet sent to the racoon ipsec key exchange server could cause a tunnel to crash, resulting in a denial of service. We recommend that you upgrade your racoon package.
- ---------------------------------------------------------------------------
Debian Security Advisory DSA 1299-1                                         dann frazier
June 7th, 2007                
- ---------------------------------------------------------------------------

Package        : ipsec-tools
Vulnerability  : missing input sanitising
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2007-2524

It was discovered that a specially-crafted packet sent to the racoon
ipsec key exchange server could cause a tunnel to crash, resulting in
a denial of service.

The oldstable distribution (sarge) isn't affected by this problem.

For the stable distribution (etch) this problem has been fixed in
version 1:0.6.6-3.1.

The unstable distribution (sid) will be fixed soon.

We recommend that you upgrade your racoon package.

Upgrade Instructions
- ---------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- --------------------------------

  Source archives:
      Size/MD5 checksum:      714 8b0036099ce66a7cbe83e54d0b904af2
      Size/MD5 checksum:    49981 087edd1d11957b09b2171900a9b11861
      Size/MD5 checksum:   914807 643a238e17148d242c603c511e28d029

  Alpha architecture:
      Size/MD5 checksum:    97060 2532ce5a61a9ddda86d2dc2b6c2fee0d
      Size/MD5 checksum:   376370 d20d19e5fa8943b80a1a5678044e578c

  AMD64 architecture:
      Size/MD5 checksum:    89052 8ff0a34a1fca0e232edcee6827233760
      Size/MD5 checksum:   341854 44f25a0b80eb783aa1c8f6a971ca237d

  ARM architecture:
      Size/MD5 checksum:    89788 d5378073f43820e820d5abfab4ea19ac
      Size/MD5 checksum:   325002 fc60192e280377c8d802827fb35e9ccf

  HP Precision architecture:
      Size/MD5 checksum:    93882 6a44a4a6f99bd607c47b993eb02ede0a
      Size/MD5 checksum:   354128 130b95fb7d817148acc080b87d650033

  Intel IA-32 architecture:
      Size/MD5 checksum:    84608 a5ae0d2e2a6c804a7bc28bd78b89b9a8
      Size/MD5 checksum:   329946 ecf6c9f4b86fa32b24ef7d395ec786bc

  Intel IA-64 architecture:
      Size/MD5 checksum:   113136 8bda8ebe0253f6a122ed55ae5594061c
      Size/MD5 checksum:   467976 f10fd34a1511d2115429a07aa66c9505

  Big endian MIPS architecture:
      Size/MD5 checksum:    89766 66e65d7dd8997376ec87419b9e578635
      Size/MD5 checksum:   344828 091f455c5364c6e086ccf3bab88b118d

  Little endian MIPS architecture:
      Size/MD5 checksum:    90078 23c815af2dd3b8caafbf51a36cc10f7e
      Size/MD5 checksum:   346628 c31717b5c9d124fb762dd6bff3f05179

  PowerPC architecture:
      Size/MD5 checksum:    90846 a90d219725f00bb471e50b959dba126a
      Size/MD5 checksum:   336966 cfe0376c21ac35af5ece94222a4d1642

  IBM S/390 architecture:
      Size/MD5 checksum:    90524 d51eafa7b1a6148c3cf81bfbe9dd512e
      Size/MD5 checksum:   341322 888ca59e56b0aec906d7e1dfb854c2f9

  Sun Sparc architecture:
      Size/MD5 checksum:    85938 57cff108c12ce7b3783a7e905e8afceb
      Size/MD5 checksum:   318274 c2f8458fa25cd0b0b1857bcd3a6d827b

  These files will probably be moved into the stable distribution on
  its next update.

- ----------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.