Mandriva Linux Security Advisory : openconnect (MDVSA-2013:108)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

Updated openconnect packages fix security vulnerability :

A stack-based buffer overflow flaw was found in the way OpenConnect, a
client for Cisco's AnyConnect VPN, performed processing of certain
host names, paths, or cookie lists, received from the VPN gateway. A
remote VPN gateway could provide a specially crafted host name, path
or cookie list that, when processed by the openconnect client would
lead to openconnect executable crash (CVE-2012-6128).

Solution :

Update the affected lib64openconnect-devel, lib64openconnect1 and / or
openconnect packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Mandriva Local Security Checks

Nessus Plugin ID: 66120 ()

Bugtraq ID: 57884

CVE ID: CVE-2012-6128

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now