First published: Tue Apr 28 2009(Updated: )
ipsec-tools upstream version 0.7.2 announcement mentions following security fix: o Fix a remote crash in fragmentation code <a href="http://sourceforge.net/project/shownotes.php?group_id=74601&release_id=677611">http://sourceforge.net/project/shownotes.php?group_id=74601&release_id=677611</a> Upstream CVS commit provides further details: From Neil Kettle: Fix a possible null pointer dereference in fragmentation code. <a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/isakmp_frag.c?f=h#rev1.4.6.1">http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/isakmp_frag.c?f=h#rev1.4.6.1</a> <a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/isakmp_frag.c.diff?r1=1.4&r2=1.4.6.1&f=h">http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/isakmp_frag.c.diff?r1=1.4&r2=1.4.6.1&f=h</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ipsec-tools |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-497990 is considered high due to the potential for a remote crash in the fragmentation code.
To fix REDHAT-BUG-497990, upgrade to the latest version of ipsec-tools that includes the security fix.
REDHAT-BUG-497990 affects systems running ipsec-tools version 0.7.2 or earlier.
REDHAT-BUG-497990 is associated with a remote code execution vulnerability that can lead to application crashes.
Currently, the recommended workaround for REDHAT-BUG-497990 is to disable the fragmentation feature in ipsec-tools until an update is applied.