Debian DSA-2893-1 : openswan - security update

medium Nessus Plugin ID 73293

Synopsis

The remote Debian host is missing a security-related update.

Description

Two vulnerabilities were fixed in Openswan, an IKE/IPsec implementation for Linux.

- CVE-2013-2053 During an audit of Libreswan (with which Openswan shares some code), Florian Weimer found a remote buffer overflow in the atodn() function. This vulnerability can be triggered when Opportunistic Encryption (OE) is enabled and an attacker controls the PTR record of a peer IP address. Authentication is not needed to trigger the vulnerability.

- CVE-2013-6466 Iustina Melinte found a vulnerability in Libreswan which also applies to the Openswan code. By carefully crafting IKEv2 packets, an attacker can make the pluto daemon dereference non-received IKEv2 payload, leading to the daemon crash. Authentication is not needed to trigger the vulnerability.

Patches were originally written to fix the vulnerabilities in Libreswan, and have been ported to Openswan by Paul Wouters from the Libreswan Project.

Since the Openswan package is not maintained anymore in the Debian distribution and is not available in testing and unstable suites, it is recommended for IKE/IPsec users to switch to a supported implementation like strongSwan.

Solution

Upgrade the openswan packages.

For the oldstable distribution (squeeze), these problems have been fixed in version 2.6.28+dfsg-5+squeeze2.

For the stable distribution (wheezy), these problems have been fixed in version 2.6.37-3.1.

See Also

https://security-tracker.debian.org/tracker/CVE-2013-2053

https://security-tracker.debian.org/tracker/CVE-2013-6466

https://packages.debian.org/source/squeeze/openswan

https://packages.debian.org/source/wheezy/openswan

https://www.debian.org/security/2014/dsa-2893

Plugin Details

Severity: Medium

ID: 73293

File Name: debian_DSA-2893.nasl

Version: 1.7

Type: local

Agent: unix

Published: 4/2/2014

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:openswan, cpe:/o:debian:debian_linux:6.0, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 3/31/2014

Reference Information

CVE: CVE-2013-2053, CVE-2013-6466

BID: 59838, 65155

DSA: 2893