openSUSE Security Update : strongswan (openSUSE-SU-2015:0114-1)

medium Nessus Plugin ID 80988

Synopsis

The remote openSUSE host is missing a security update.

Description

This update fixes the following security issues :

- denial-of-service vulnerability, which can be triggered by an IKEv2 Key Exchange payload, that contains the Diffie-Hellman group 1025 (bsc#910491,CVE-2014-9221).

- Applied an upstream patch reverting to store algorithms in the registration order again as ordering them by identifier caused weaker algorithms to be proposed first by default (bsc#897512).

Solution

Update the affected strongswan packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=897048

https://bugzilla.opensuse.org/show_bug.cgi?id=897512

https://bugzilla.opensuse.org/show_bug.cgi?id=910491

https://lists.opensuse.org/opensuse-updates/2015-01/msg00054.html

Plugin Details

Severity: Medium

ID: 80988

File Name: openSUSE-2015-54.nasl

Version: 1.4

Type: local

Agent: unix

Published: 1/26/2015

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:strongswan, p-cpe:/a:novell:opensuse:strongswan-debugsource, p-cpe:/a:novell:opensuse:strongswan-ipsec, p-cpe:/a:novell:opensuse:strongswan-ipsec-debuginfo, p-cpe:/a:novell:opensuse:strongswan-libs0, p-cpe:/a:novell:opensuse:strongswan-libs0-debuginfo, p-cpe:/a:novell:opensuse:strongswan-mysql, p-cpe:/a:novell:opensuse:strongswan-mysql-debuginfo, p-cpe:/a:novell:opensuse:strongswan-nm, p-cpe:/a:novell:opensuse:strongswan-nm-debuginfo, p-cpe:/a:novell:opensuse:strongswan-sqlite, p-cpe:/a:novell:opensuse:strongswan-sqlite-debuginfo, cpe:/o:novell:opensuse:13.1, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 1/6/2015

Reference Information

CVE: CVE-2014-9221