Mandrake Linux Security Advisory : super-freeswan (MDKSA-2004:070-1)

This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing one or more security
updates.

Description :

Thomas Walpuski discovered a vulnerability in the X.509 handling of
super-freeswan, openswan, strongSwan, and FreeS/WAN with the X.509
patch applied. This vulnerability allows an attacker to make up their
own Certificate Authority that can allow them to impersonate the
identity of a valid DN. As well, another hole exists in the CA
checking code that could create an endless loop in certain instances.

Mandrakesoft encourages all users who use FreeS/WAN or super-freeswan
to upgrade to the updated packages which are patched to correct these
flaws.

Update :

Due to a build error, the super-freeswan packages did not include the
pluto program. The updated packages fix this error.

See also :

http://lists.openswan.org/pipermail/dev/2004-June/000369.html
http://www.openswan.org/support/vuln/CVE-2004-0590/

Solution :

Update the affected super-freeswan and / or super-freeswan-doc
packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 14820 (mandrake_MDKSA-2004-070.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0590

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now