Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.63280
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: ipsec-tools
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: ipsec-tools

CVE-2008-3651
Memory leak in racoon/proposal.c in the racoon daemon in ipsec-tools
before 0.7.1 allows remote authenticated users to cause a denial of
service (memory consumption) via invalid proposals.

CVE-2008-3652
src/racoon/handler.c in racoon in ipsec-tools does not remove an
'orphaned ph1' (phase 1) handle when it has been initiated remotely,
which allows remote attackers to cause a denial of service (resource
consumption).

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-3651
1020667
http://www.securitytracker.com/id?1020667
30657
http://www.securityfocus.com/bid/30657
31450
http://secunia.com/advisories/31450
31624
http://secunia.com/advisories/31624
32759
http://secunia.com/advisories/32759
32971
http://secunia.com/advisories/32971
35074
http://secunia.com/advisories/35074
ADV-2008-2345
http://www.vupen.com/english/advisories/2008/2345
ADV-2008-2844
http://www.vupen.com/english/advisories/2008/2844
ADV-2009-1297
http://www.vupen.com/english/advisories/2009/1297
ADV-2009-1621
http://www.vupen.com/english/advisories/2009/1621
APPLE-SA-2009-05-12
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
APPLE-SA-2009-06-17-1
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
GLSA-200812-03
http://security.gentoo.org/glsa/glsa-200812-03.xml
MDVSA-2008:181
http://www.mandriva.com/security/advisories?name=MDVSA-2008:181
RHSA-2008:0849
http://www.redhat.com/support/errata/RHSA-2008-0849.html
SUSE-SR:2008:025
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
SUSE-SR:2009:004
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
USN-641-1
http://www.ubuntu.com/usn/usn-641-1
[ipsec-tools-announce] 20080724 Ipsec-tools 0.7.1 released
http://sourceforge.net/mailarchive/message.php?msg_name=20080724084529.GA3768%40zen.inc
[ipsec-tools-devel] 20080724 Ipsec-tools 0.7.1 released
http://marc.info/?l=ipsec-tools-devel&m=121688914101709&w=2
http://sourceforge.net/project/shownotes.php?release_id=615380&group_id=74601
http://support.apple.com/kb/HT3549
http://support.apple.com/kb/HT3639
https://bugzilla.redhat.com/show_bug.cgi?id=456660
ipsectools-racoon-dos(44395)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44395
oval:org.mitre.oval:def:10453
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10453
Common Vulnerability Exposure (CVE) ID: CVE-2008-3652
1020692
http://www.securitytracker.com/id?1020692
31478
http://secunia.com/advisories/31478
ADV-2008-2378
http://www.vupen.com/english/advisories/2008/2378
[ipsec-tools-devel] 20080811 [PATCH] Track and delete orphaned ph1s
http://sourceforge.net/mailarchive/forum.php?thread_name=48a0c7a0.qPeWZAE0PY8bDDq%2B%25olel%40ans.pl&forum_name=ipsec-tools-devel
ipsectools-orphanedph1-dos(44424)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44424
oval:org.mitre.oval:def:10448
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10448
CopyrightCopyright (C) 2009 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.