Debian DSA-104-1 : cipe - DoS attack

medium Nessus Plugin ID 14941

Synopsis

The remote Debian host is missing a security-related update.

Description

Larry McVoy found a bug in the packet handling code for the CIPE VPN package: it did not check if a received packet was too short and could crash.

Solution

This has been fixed in version 1.3.0-3, and we recommend that you upgrade your CIPE packages immediately.

Please note that the package only contains the required kernel patch, you will have to manually build the kernel modules for your kernel with the updated source from the cipe-source package.

See Also

http://www.debian.org/security/2002/dsa-104

Plugin Details

Severity: Medium

ID: 14941

File Name: debian_DSA-104.nasl

Version: 1.16

Type: local

Agent: unix

Published: 9/29/2004

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:2.2, p-cpe:/a:debian:debian_linux:cipe

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 1/14/2002

Reference Information

CVE: CVE-2002-0047

DSA: 104