Debian DSA-4312-1 : tinc - security update

medium Nessus Plugin ID 117958

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities were discovered in tinc, a Virtual Private Network (VPN) daemon. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2018-16738 Michael Yonli discovered a flaw in the implementation of the authentication protocol that could allow a remote attacker to establish an authenticated, one-way connection with another node.

- CVE-2018-16758 Michael Yonli discovered that a man-in-the-middle that has intercepted a TCP connection might be able to disable encryption of UDP packets sent by a node.

Solution

Upgrade the tinc packages.

For the stable distribution (stretch), these problems have been fixed in version 1.0.31-1+deb9u1.

See Also

https://security-tracker.debian.org/tracker/CVE-2018-16738

https://security-tracker.debian.org/tracker/CVE-2018-16758

https://security-tracker.debian.org/tracker/source-package/tinc

https://packages.debian.org/source/stretch/tinc

https://www.debian.org/security/2018/dsa-4312

Plugin Details

Severity: Medium

ID: 117958

File Name: debian_DSA-4312.nasl

Version: 1.6

Type: local

Agent: unix

Published: 10/9/2018

Updated: 2/10/2022

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2018-16758

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:tinc, cpe:/o:debian:debian_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 10/8/2018

Vulnerability Publication Date: 10/10/2018

Reference Information

CVE: CVE-2018-16738, CVE-2018-16758

DSA: 4312