Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2004:070-1: super-freeswan

Vulnerability Assessment Details

MDKSA-2004:070-1: super-freeswan

Vulnerability Assessment Summary
Check for the version of the super-freeswan package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2004:070-1 (super-freeswan).

Thomas Walpuski discovered a vulnerability in the X.509 handling of
super-freeswan, openswan, strongSwan, and FreeS/WAN with the X.509 patch
applied. This vulnerability permits a possible hacker to make up their own Certificate
Authority that can permit them to impersonate the identity of a valid DN. As
well, another hole exists in the CA checking code that could create an endless
loop in certain instances.
Mandrakesoft encourages all users who use FreeS/WAN or super-freeswan to upgrade
to the updated packages which are patched to correct these flaws.
Due to a build error, the super-freeswan packages did not include the pluto
program. The updated packages fix this error.

Solution :
Network Security Threat Level: High

Networks Security ID: 10611

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

SEAGATE Expansion Portable Hard Drive - 4 TB, Black - Currys
SEAGATE Expansion Portable Hard Drive - 4 TB, Black - Currys picture


No Discussions have been posted on this vulnerability.