Multiple denial of service, possibly leading to arbitrary code execution flaws were corrected in upstream 2.0.3 version of fwknop (from upstream Changelog at [1]): 1) [server] Fernando Arnaboldi from IOActive found several DoS/code execution vulnerabilities for malicious fwknop clients that manage to get past the authentication stage (so a such a client must be in possession of a valid access.conf encryption key). These vulnerabilities manifested themselves in the handling of malformed access requests, and both the fwknopd server code along with libfko now perform stronger input validation of access request data. These vulnerabilities affect pre-2.0.3 fwknop releases. References: [1] http://www.cipherdyne.org/blog/categories/software-releases.html [2] http://secunia.com/advisories/50522/ [3] http://www.openwall.com/lists/oss-security/2012/09/20/4 Relevant upstream patch: [4] http://www.cipherdyne.org/cgi-bin/gitweb.cgi?p=fwknop.git;a=commitdiff;h=d46ba1c027a11e45821ba897a4928819bccc8f22
This issue affects the versions of the fwknop package, as shipped with Rawhide and Fedora release of 17. Please schedule an update. -- This issue did NOT affect the version of the fwknop package, as shipped with Fedora release of 16 (as it is Perl language based implementation yet).
Created fwknop tracking bugs for this issue Affects: fedora-rawhide [bug 859006] Affects: fedora-17 [bug 859007]