Summary
The remote host is missing an update to cipe
announced via advisory DSA 104-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20104-1
Insight
Larry McVoy found a bug in the packet handling code for the CIPE VPN package: it did not check if a received packet was too short and could crash.
This has been fixed in version 1.3.0-3, and we recommend that you upgrade your cipe packages immediately.
Please note that the package only contains the needed kernel patch, you will have to build the kernel modules for your kernel with the updated source from the cipe-source package.
Severity
Classification
-
CVE CVE-2002-0047 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities