Rapid7 Vulnerability & Exploit Database

RHSA-2009:0402: openswan security update

Back to Search

RHSA-2009:0402: openswan security update

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
04/01/2009
Created
07/25/2018
Added
09/12/2009
Modified
07/04/2017

Description

Openswan is a free implementation of Internet Protocol Security (IPsec)and Internet Key Exchange (IKE). IPsec uses strong cryptography to provideboth authentication and encryption services. These services allow you tobuild secure tunnels through untrusted networks. Everything passing throughthe untrusted network is encrypted by the IPsec gateway machine, anddecrypted by the gateway at the other end of the tunnel. The resultingtunnel is a virtual private network (VPN).Gerd v. Egidy discovered a flaw in the Dead Peer Detection (DPD) inOpenswan's pluto IKE daemon. A remote attacker could use a malicious DPDpacket to crash the pluto daemon. (CVE-2009-0790)It was discovered that Openswan's livetest script created temporary filesin an insecure manner. A local attacker could use this flaw to overwritearbitrary files owned by the user running the script. (CVE-2008-4190)Note: The livetest script is an incomplete feature and was notautomatically executed by any other script distributed with Openswan, orintended to be used at all, as was documented in its man page. In theseupdated packages, the script only prints an informative message and exitsimmediately when run.All users of openswan are advised to upgrade to these updated packages,which contain backported patches to correct these issues. After installingthis update, the ipsec service will be restarted automatically.

Solution(s)

  • redhat-upgrade-openswan
  • redhat-upgrade-openswan-doc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;