Mandriva Linux Security Advisory : openconnect (MDVSA-2013:108)

Medium Nessus Plugin ID 66120


The remote Mandriva Linux host is missing one or more security updates.


Updated openconnect packages fix security vulnerability :

A stack-based buffer overflow flaw was found in the way OpenConnect, a client for Cisco's AnyConnect VPN, performed processing of certain host names, paths, or cookie lists, received from the VPN gateway. A remote VPN gateway could provide a specially crafted host name, path or cookie list that, when processed by the openconnect client would lead to openconnect executable crash (CVE-2012-6128).


Update the affected lib64openconnect-devel, lib64openconnect1 and / or openconnect packages.

Plugin Details

Severity: Medium

ID: 66120

File Name: mandriva_MDVSA-2013-108.nasl

Version: $Revision: 1.5 $

Type: local

Published: 2013/04/20

Modified: 2014/08/16

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64openconnect-devel, p-cpe:/a:mandriva:linux:lib64openconnect1, p-cpe:/a:mandriva:linux:openconnect, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/04/10

Reference Information

CVE: CVE-2012-6128

BID: 57884

MDVSA: 2013:108

MGASA: 2013-0060