Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Zwei Probleme in strongSwan
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in strongSwan
ID: USN-3301-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 16.10, Ubuntu 17.04
Datum: Di, 30. Mai 2017, 18:40
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9023
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9022

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============7129870224178372268==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="i126uLvcFKm9n4niks6G0VuaaXe6TnW55"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--i126uLvcFKm9n4niks6G0VuaaXe6TnW55
Content-Type: multipart/mixed;
boundary="tJ7oCbwFnQL12q5mqoiOqw3vLCn895U7B";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <0d809665-22e9-ed90-1e6b-99f780f58570@canonical.com>
Subject: [USN-3301-1] strongSwan vulnerabilities

--tJ7oCbwFnQL12q5mqoiOqw3vLCn895U7B
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3301-1
May 30, 2017

strongswan vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

strongSwan could be made to crash or hang if it received specially crafted
network traffic.

Software Description:
- strongswan: IPsec VPN solution

Details:

It was discovered that the strongSwan gmp plugin incorrectly validated RSA
public keys. A remote attacker could use this issue to cause strongSwan to
crash, resulting in a denial of service. (CVE-2017-9022)

It was discovered that strongSwan incorrectly parsed ASN.1 CHOICE types. A
remote attacker could use this issue to cause strongSwan to hang, resulting
in a denial of service. (CVE-2017-9023)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
libstrongswan 5.5.1-1ubuntu3.1
strongswan 5.5.1-1ubuntu3.1

Ubuntu 16.10:
libstrongswan 5.3.5-1ubuntu4.3
strongswan 5.3.5-1ubuntu4.3
strongswan-plugin-gmp 5.3.5-1ubuntu4.3

Ubuntu 16.04 LTS:
libstrongswan 5.3.5-1ubuntu3.3
strongswan 5.3.5-1ubuntu3.3
strongswan-plugin-gmp 5.3.5-1ubuntu3.3

Ubuntu 14.04 LTS:
libstrongswan 5.1.2-0ubuntu2.6
strongswan 5.1.2-0ubuntu2.6
strongswan-plugin-gmp 5.1.2-0ubuntu2.6

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3301-1
CVE-2017-9022, CVE-2017-9023

Package Information:
https://launchpad.net/ubuntu/+source/strongswan/5.5.1-1ubuntu3.1
https://launchpad.net/ubuntu/+source/strongswan/5.3.5-1ubuntu4.3
https://launchpad.net/ubuntu/+source/strongswan/5.3.5-1ubuntu3.3
https://launchpad.net/ubuntu/+source/strongswan/5.1.2-0ubuntu2.6



--tJ7oCbwFnQL12q5mqoiOqw3vLCn895U7B--

--i126uLvcFKm9n4niks6G0VuaaXe6TnW55
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=OGg2
-----END PGP SIGNATURE-----

--i126uLvcFKm9n4niks6G0VuaaXe6TnW55--


--===============7129870224178372268==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============7129870224178372268==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung