A stack-based buffer overflow flaw was found in the way OpenConnect, a client for Cisco's "AnyConnect" VPN, performed processing of certain host names, paths, or cookie lists, received from the VPN gateway. A remote VPN gateway could provide a specially-crafted host name, path or cookie list that, when processed by the openconnect client would lead to openconnect executable crash. Relevant upstream patch: [1] http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/26f752c3dbf69227679fc6bebb4ae071aecec491 References: [2] http://www.openwall.com/lists/oss-security/2013/02/11/9 [3] http://www.infradead.org/openconnect/changelog.html
This issue affects the versions of the openconnect package, as shipped with Fedora release of 17 and 18. Please schedule an update. -- This issue affects the versions of the openconnect package, as shipped with Fedora EPEL 5 and Fedora EPEL 6. Please schedule an update.
Created openconnect tracking bugs for this issue Affects: fedora-all [bug 910331] Affects: epel-all [bug 910333]
This was assigned CVE-2012-6128: http://www.openwall.com/lists/oss-security/2013/02/12/7
openconnect-4.08-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
openconnect-4.08-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
openconnect-4.08-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
openconnect-4.08-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.