SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Racoon Vendors:   KAME Project
(Gentoo Issues Fix) KAME Racoon RSA Signature IKE Phase 1 Authentication Flaw Authenticates Remote Users
SecurityTracker Alert ID:  1009700
SecurityTracker URL:  http://securitytracker.com/id/1009700
CVE Reference:   CVE-2004-0155   (Links to External Site)
Date:  Apr 7 2004
Impact:   Host/resource access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): crypto_openssl.c file version 1.83 and prior versions
Description:   An authentication vulnerability was reported in KAME Racoon. A remote user with a valid certificate but invalid key can be authenticated in certain cases.

Ralf Spenneberg reported that a remote user with a valid RSA signature (but without the proper private key) can connect using IKE Phase 1 main mode or aggresive mode and be succesfully authenticated.

The flaw resides in 'crypto_openssl.c' in the eay_check_x509sign() function.

Impact:   A remote user can be authenticated without having the proper private RSA key.
Solution:   Gentoo has released a fix for ipsec-tools and indicates that ipsec-tools users should upgrade to version 0.2.5 or later:

# emerge sync

# emerge -pv ">=3Dnet-firewall/ipsec-tools-0.2.5"
# emerge ">=3Dnet-firewall/ipsec-tools-0.2.5"

Vendor URL:  www.kame.net/racoon/ (Links to External Site)
Cause:   Authentication error
Underlying OS:  Linux (Gentoo)

Message History:   This archive entry is a follow-up to the message listed below.
Apr 7 2004 KAME Racoon RSA Signature IKE Phase 1 Authentication Flaw Authenticates Remote Users



 Source Message Contents

Subject:  [gentoo-announce] [ GLSA 200404-05 ] ipsec-tools contains an X.509 certificates vulnerability



--oj4kGyHlBMXGt3Le
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200404-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                             http://security.gentoo.org
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: High
     Title: ipsec-tools contains an X.509 certificates vulnerability.

      Date: April 07, 2004=20
      Bugs: #47013
        ID: 200404-05

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
=3D=3D=3D=3D=3D=3D=3D=3D

ipsec-tools contains a vulnerability that affects connections
authenticated  with X.509 certificates.

Background
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

=46rom http://ipsec-tools.sourceforge.net/ :

"IPsec-Tools is a port of KAME's IPsec utilities to the Linux-2.6 IPsec
implementation."

Affected packages
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

    -------------------------------------------------------------------
     Package                   /   Vulnerable   /           Unaffected
    -------------------------------------------------------------------
     net-firewall/ipsec-tools       <=3D 0.2.4                  >=3D 0.2.5

Description
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

racoon (a utility in the ipsec-tools package) does not verify digital
signatures on Phase1 packets. This means that anybody holding the
correct X.509 certificate would be able to establish a connection, even
if they did not have the corresponding private key.

Impact
=3D=3D=3D=3D=3D=3D

Since digital signatures are not verified by the racoon tool, an
attacker may be able to connect to the VPN gateway and/or execute a
man-in-the-middle attack.

Workaround
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A workaround is not currently known for this issue. All users are
advised to upgrade to the latest version of the affected package.

Resolution
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

ipsec-tools users should upgrade to version 0.2.5 or later:

    # emerge sync

    # emerge -pv ">=3Dnet-firewall/ipsec-tools-0.2.5"
    # emerge ">=3Dnet-firewall/ipsec-tools-0.2.5"

Concerns?
=3D=3D=3D=3D=3D=3D=3D=3D=3D

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

--oj4kGyHlBMXGt3Le
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQFAdBXSJPpRNiftIEYRAhbMAJ9Be2sBReilnz6Mb5LLElAkPA4y9gCeIYCU
KE9zt2RQGhY2apm6GA2cPLA=
=9du3
-----END PGP SIGNATURE-----

--oj4kGyHlBMXGt3Le--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC