SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VPN)  >   Openswan Vendors:   openswan.org
Openswan Use-after-free Memory Error in Crypto Helper Lets Remote Authenticated Users Deny Service
SecurityTracker Alert ID:  1026268
SecurityTracker URL:  http://securitytracker.com/id/1026268
CVE Reference:   CVE-2011-4073   (Links to External Site)
Date:  Nov 3 2011
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 2.3.0 - 2.6.36
Description:   A vulnerability was reported in Openswan. A remote authenticated user can cause denial of service conditions.

A remote authenticated user can send specially crafted IKE data to cause the target pluto helper daemon to crash.

Petar Tsankov, Mohammad Torabi Dashti and David Basin of the information security group at ETH Zurich reported this vulnerability.

Impact:   A remote authenticated user can cause the target pluto daemon to crash.
Solution:   The vendor has issued a fix (2.6.37).

The vendor's advisory is available at:

http://openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt

Vendor URL:  openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Nov 3 2011 (Red Hat Issues Fix) Openswan Use-after-free Memory Error in Crypto Helper Lets Remote Authenticated Users Deny Service
Red Hat has issued a fix for Red Hat Enterprise Linux 5 and 6.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC