Rapid7 Vulnerability & Exploit Database

RHSA-2010:0892: openswan security update

Back to Search

RHSA-2010:0892: openswan security update

Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
10/05/2010
Created
07/25/2018
Added
01/04/2011
Modified
07/04/2017

Description

Openswan is a free implementation of Internet Protocol Security (IPsec)and Internet Key Exchange (IKE). IPsec uses strong cryptography to provideboth authentication and encryption services. These services allow you tobuild secure tunnels through untrusted networks.Two buffer overflow flaws were found in the Openswan client-side XAUTHhandling code used when connecting to certain Cisco gateways. A maliciousor compromised VPN gateway could use these flaws to execute arbitrary codeon the connecting Openswan client. (CVE-2010-3302, CVE-2010-3308)Two input sanitization flaws were found in the Openswan client-sidehandling of Cisco gateway banners. A malicious or compromised VPN gatewaycould use these flaws to execute arbitrary code on the connecting Openswanclient. (CVE-2010-3752, CVE-2010-3753)Red Hat would like to thank the Openswan project for reporting theseissues. Upstream acknowledges D. Hugh Redelmeier and Paul Wouters as theoriginal reporters.All users of openswan are advised to upgrade to these updated packages,which contain backported patches to correct these issues. After installingthis update, the ipsec service will be restarted automatically.

Solution(s)

  • redhat-upgrade-openswan
  • redhat-upgrade-openswan-debuginfo
  • redhat-upgrade-openswan-doc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;