Mandriva Linux Security Advisory : openconnect (MDVSA-2013:108)

medium Nessus Plugin ID 66120

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Updated openconnect packages fix security vulnerability :

A stack-based buffer overflow flaw was found in the way OpenConnect, a client for Cisco's AnyConnect VPN, performed processing of certain host names, paths, or cookie lists, received from the VPN gateway. A remote VPN gateway could provide a specially crafted host name, path or cookie list that, when processed by the openconnect client would lead to openconnect executable crash (CVE-2012-6128).

Solution

Update the affected lib64openconnect-devel, lib64openconnect1 and / or openconnect packages.

Plugin Details

Severity: Medium

ID: 66120

File Name: mandriva_MDVSA-2013-108.nasl

Version: 1.8

Type: local

Published: 4/20/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64openconnect-devel, p-cpe:/a:mandriva:linux:lib64openconnect1, p-cpe:/a:mandriva:linux:openconnect, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 4/10/2013

Reference Information

CVE: CVE-2012-6128

BID: 57884

MDVSA: 2013:108

MGASA: 2013-0060