DSA-201-1 freeswan -- denial of service

Related Vulnerabilities: CVE-2002-0666  

Bindview discovered a problem in several IPSEC implementations that do not properly handle certain very short packets. IPSEC is a set of security extensions to IP which provide authentication and encryption. Free/SWan in Debian is affected by this and is said to cause a kernel panic. This problem has been fixed in version 1.96-1.4 for the current stable distribution (woody) and in version 1.99-1 for the unstable distribution (sid). The old stable distribution (potato) does not contain Free/SWan packages. We recommend that you upgrade your freeswan package.

Debian Security Advisory

DSA-201-1 freeswan -- denial of service

Date Reported:
02 Dec 2002
Affected Packages:
freeswan
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2002-0666.
CERT's vulnerabilities, advisories and incident notes: VU#459371.
More information:

Bindview discovered a problem in several IPSEC implementations that do not properly handle certain very short packets. IPSEC is a set of security extensions to IP which provide authentication and encryption. Free/SWan in Debian is affected by this and is said to cause a kernel panic.

This problem has been fixed in version 1.96-1.4 for the current stable distribution (woody) and in version 1.99-1 for the unstable distribution (sid). The old stable distribution (potato) does not contain Free/SWan packages.

We recommend that you upgrade your freeswan package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/f/freeswan/freeswan_1.96-1.4.dsc
http://security.debian.org/pool/updates/main/f/freeswan/freeswan_1.96-1.4.diff.gz
http://security.debian.org/pool/updates/main/f/freeswan/freeswan_1.96.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/f/freeswan/kernel-patch-freeswan_1.96-1.4_all.deb
Alpha:
http://security.debian.org/pool/updates/main/f/freeswan/freeswan_1.96-1.4_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/f/freeswan/freeswan_1.96-1.4_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/f/freeswan/freeswan_1.96-1.4_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/f/freeswan/freeswan_1.96-1.4_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/f/freeswan/freeswan_1.96-1.4_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/f/freeswan/freeswan_1.96-1.4_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/f/freeswan/freeswan_1.96-1.4_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/f/freeswan/freeswan_1.96-1.4_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/f/freeswan/freeswan_1.96-1.4_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/f/freeswan/freeswan_1.96-1.4_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/f/freeswan/freeswan_1.96-1.4_sparc.deb

MD5 checksums of the listed files are available in the original advisory.