Bug 456660 (CVE-2008-3651)
Summary: | CVE-2008-3651 ipsec-tools: racoon memory leak caused by invalid proposals | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | bressers, kreilly, skakar, tmraz | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2008-11-07 08:11:17 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 458629, 458853, 458854, 458855, 458856, 458857, 465472, 465473 | ||||||
Bug Blocks: | |||||||
Attachments: |
|
Description
Tomas Hoger
2008-07-25 12:36:29 UTC
The leaks patched in the mentioned patch can happen only when phase 1 is completed. That means the attacker would have to be authenticated to be able to make the leaks happen. Any guess on what "some configurations" could mean from the upstream announcement? I am not sure about that - it seems to me that in almost any configuration the responder of the IKE negotiation is vulnerable. But as I said in the comment #2 this problem is in the Phase 2 exchange so that means the attacker has to be already authenticated. Created attachment 314117 [details]
Patch from upstream CVS
CVE id CVE-2008-3651 was assigned to this issue: Memory leak in racoon/proposal.c in the racoon daemon in ipsec-tools before 0.7.1 allows remote authenticated users to cause a denial of service (memory consumption) via invalid proposals. ipsec-tools-0.7.1-5.fc8 has been submitted as an update for Fedora 8. http://admin.fedoraproject.org/updates/ipsec-tools-0.7.1-5.fc8 ipsec-tools-0.7.1-5.fc9 has been submitted as an update for Fedora 9. http://admin.fedoraproject.org/updates/ipsec-tools-0.7.1-5.fc9 ipsec-tools-0.7.1-5.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report. ipsec-tools-0.7.1-5.fc8 has been pushed to the Fedora 8 stable repository. If problems still persist, please make note of it in this bug report. This issue was addressed in: Red Hat Enterprise Linux: http://rhn.redhat.com/errata/RHSA-2008-0849.html Fedora: https://admin.fedoraproject.org/updates/F8/FEDORA-2008-9016 https://admin.fedoraproject.org/updates/F9/FEDORA-2008-9007 |