![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.51904 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Security Advisory RHSA-2005:232 |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing updates announced in advisory RHSA-2005:232. The ipsec-tools package is used in conjunction with the IPsec functionality in the linux kernel. The ipsec-tools package includes: - - setkey, a program to directly manipulate policies and SAs - - racoon, an IKEv1 keying daemon A bug was found in the way the racoon daemon handled incoming ISAKMP requests. It is possible that an attacker could crash the racoon daemon by sending a specially crafted ISAKMP packet. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0398 to this issue. Additionally, the following issues have been fixed: - - racoon mishandled restarts in the presence of stale administration sockets. - - on Red Hat Enterprise Linux 4, racoon and setkey did not properly set up forward policies, which prevented tunnels from working. Users of ipsec-tools should upgrade to this updated package, which contains backported patches, and is not vulnerable to these issues. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2005-232.html Risk factor : Medium CVSS Score: 5.0 |
Referencia Cruzada: |
BugTraq ID: 12804 Common Vulnerability Exposure (CVE) ID: CVE-2005-0398 1013433 http://securitytracker.com/id?1013433 12804 http://www.securityfocus.com/bid/12804 14584 http://secunia.com/advisories/14584 ADV-2005-0264 http://www.vupen.com/english/advisories/2005/0264 GLSA-200503-33 http://security.gentoo.org/glsa/glsa-200503-33.xml MDKSA-2005:062 http://www.mandriva.com/security/advisories?name=MDKSA-2005:062 RHSA-2005:232 http://www.redhat.com/support/errata/RHSA-2005-232.html [ipsec-tools-devel] 20050312 potential remote crash in racoon http://sourceforge.net/mailarchive/forum.php?thread_id=6787713&forum_id=32000 https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=109966&action=view oval:org.mitre.oval:def:10028 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10028 racoon-isakmp-header-dos(19707) https://exchange.xforce.ibmcloud.com/vulnerabilities/19707 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |