Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.871682
Categoría:Red Hat Local Security Checks
Título:RedHat Update for libreswan RHSA-2016:2603-02
Resumen:The remote host is missing an update for the 'libreswan'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'libreswan'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Libreswan is an implementation of IPsec
& IKE for Linux. IPsec is the Internet Protocol Security and uses strong
cryptography to provide both authentication and encryption services. These
services allow you to build secure tunnels through untrusted networks such as
virtual private network (VPN).

Security Fix(es):

* A traffic amplification flaw was found in the Internet Key Exchange
version 1 (IKEv1) protocol. A remote attacker could use a libreswan server
with IKEv1 enabled in a network traffic amplification denial of service
attack against other hosts on the network by sending UDP packets with a
spoofed source address to that server. (CVE-2016-5361)

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.3 Release Notes linked from the References section.

Affected Software/OS:
libreswan on Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2016-5361
http://www.openwall.com/lists/oss-security/2016/06/10/4
https://lists.libreswan.org/pipermail/swan-dev/2016-March/001394.html
RedHat Security Advisories: RHSA-2016:2603
http://rhn.redhat.com/errata/RHSA-2016-2603.html
CopyrightCopyright (C) 2016 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.