Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA104] DSA-104-1 cipe


Vulnerability Assessment Details

[DSA104] DSA-104-1 cipe

Vulnerability Assessment Summary
DSA-104-1 cipe

Detailed Explanation for this Vulnerability Assessment

Larry McVoy found a bug in the packet handling code for the CIPE
VPN package: it did not check if a received packet was too short
and could crash.
This has been fixed in version 1.3.0-3, and we recommend that you
upgrade your CIPE packages immediately.
Please note that the package only contains the required kernel patch,
you will have to manually build the kernel modules for your kernel with the
updated source from the cipe-source package.


Solution : http://www.debian.org/security/2002/dsa-104
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Altair S-100 Board MITS 88-4 PIO Rev 0
$149.99
Altair S-100 Board  MITS 88-4 PIO Rev 0 pictureAltair S-100 Board MITS 16K Dynamic Memory
$149.99
Altair S-100 Board  MITS 16K Dynamic Memory pictureAltair S-100 Board MITS 4K Dynamic Memory
$129.99
Altair S-100 Board  MITS 4K Dynamic Memory pictureAltair S-100 Board MITS 88-MUX Rev 0 Production Sample
$189.99
Altair S-100 Board  MITS 88-MUX Rev 0 Production Sample picture


Discussions

No Discussions have been posted on this vulnerability.