openSUSE Security Update : openconnect (openSUSE-SU-2013:0979-1)

medium Nessus Plugin ID 75002

Synopsis

The remote openSUSE host is missing a security update.

Description

This version update fixes several bugs :

- Frequent connection drops fixed (bnc#817152).

- Update to version 4.09

- Fix overflow on HTTP request buffers (CVE-2012-6128)(bnc#803347)

- Fix connection to servers with round-robin DNS with two-stage auth/connect.

- Impose minimum MTU of 1280 bytes.

- Fix some harmless issues reported by Coverity.

- Improve 'Attempting to connect...' message to be explicit when it's connecting to a proxy.

- Update to version 4.07

- Fix segmentation fault when invoked with -p argument.

- Fix handling of write stalls on CSTP (TCP) socket.

- Update to version 4.06

- Fix default CA location for non-Fedora systems with old GnuTLS.

- Improve error handing when vpnc-script exits with error.

- Handle PKCS#11 tokens which won't list keys without login.

- Update to version 4.05

- Use correct CSD script for Mac OS X.

- Fix endless loop in PIN cache handling with multiple PKCS#11 tokens.

- Fix PKCS#11 URI handling to preserve all attributes.

- Don't forget key password on GUI reconnect.

- Fix GnuTLS v3 build on OpenBSD.

- Update to version 4.04

- Fix GnuTLS password handling for PKCS#8 files.

- Update to version 4.03

- Fix --no-proxy option.

- Fix handling of requested vs. received MTU settings.

- Fix DTLS MTU for GnuTLS 3.0.21 and newer.

- Support more ciphers for OpenSSL encrypted PEM keys, with GnuTLS.

- Fix GnuTLS compatibility issue with servers that insist on TLSv1.0 or non-AES ciphers (RH#836558).

- Update to version 4.02

- Fix build failure due to unconditional inclusion of <gnutls/dtls.h>.

- Update to version 4.01

- Add support for OpenSSL's odd encrypted PKCS#1 files, for GnuTLS.

- Fix repeated passphrase retry for OpenSSL.

- Add keystore support for Android.

- Support TPM, and also additional checks on PKCS#11 certs, even with GnuTLS 2.12.

- Fix library references to OpenSSL's ERR_print_errors_cb() when built against GnuTLS v2.12.

- Update to version 4.00

- Add support for OpenSSL's odd encrypted PKCS#1 files, for GnuTLS.

- Fix repeated passphrase retry for OpenSSL.

- Add keystore support for Android.

- Support TPM, and also additional checks on PKCS#11 certs, even with GnuTLS 2.12.

- Fix library references to OpenSSL's ERR_print_errors_cb() when built against GnuTLS v2.12.

Solution

Update the affected openconnect packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=817152

https://lists.opensuse.org/opensuse-updates/2013-06/msg00115.html

Plugin Details

Severity: Medium

ID: 75002

File Name: openSUSE-2013-429.nasl

Version: 1.5

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:openconnect-devel, cpe:/o:novell:opensuse:12.3, p-cpe:/a:novell:opensuse:openconnect-debuginfo, p-cpe:/a:novell:opensuse:openconnect-lang, p-cpe:/a:novell:opensuse:openconnect-debugsource, p-cpe:/a:novell:opensuse:openconnect

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 5/3/2013

Reference Information

CVE: CVE-2012-6128