Bug 173165 - Openswan Denial of Service
Openswan Denial of Service
Product: Fedora
Classification: Fedora
Component: openswan (Show other bugs)
All Linux
medium Severity high
: ---
: ---
Assigned To: Harald Hoyer
: Security
Depends On:
  Show dependency treegraph
Reported: 2005-11-14 13:58 EST by Josh Bressers
Modified: 2007-11-30 17:11 EST (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2005-12-12 08:11:10 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Josh Bressers 2005-11-14 13:58:32 EST
Openswan Denial of Service

NISCC has reported two Denial of Service issues in Openswan.  The
first involves a specially crafted 3DES packet with an invalid key
length.  The second is not entirely understood at this time.

The Openswan project has relased version 2.4.2 to fix the 3DES issue.


This issue also affects FC3
Comment 1 Paul Wouters 2005-11-21 11:09:46 EST
Please do not use 2.4.2 but go to 2.4.4 directly, as this fixes the second
crasher found by the IPsec proto test suite. It is a DOS as well, but it
requires using PSK + aggressive mode and knowing the PSK (which is vulnerable to
a MITM anyway)

I will be folding back your spec changes again sometime this week.

See  http://lists.openswan.org/pipermail/announce/2005-November/000009.html

We did not incorporate your aggressive mode fixes, however various changes to
aggressive mode code were made. Please check if that solved your Cisco 3000
issues. If you still need to apply your patches, please let us know so we can
properly fix those. thanks.
Comment 2 Fedora Update System 2005-11-21 12:33:39 EST
From User-Agent: XML-RPC

openswan-2.4.4-1.0.FC4.1 has been pushed for FC4, which should resolve this issue.  If these problems are still present in this version, then please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.