Summary
The remote host is missing updates announced in
advisory GLSA 200406-20.
Solution
All FreeS/WAN 1.9x users should upgrade to the latest stable version:
# emerge sync
# emerge -pv '=net-misc/freeswan-1.99-r1'
# emerge '=net-misc/freeswan-1.99-r1'
All FreeS/WAN 2.x users should upgrade to the latest stable version:
# emerge sync
# emerge -pv '>=net-misc/freeswan-2.04-r1'
# emerge '>=net-misc/freeswan-2.04-r1'
All Openswan 1.x users should upgrade to the latest stable version:
# emerge sync
# emerge -pv '=net-misc/openswan-1.0.6_rc1'
# emerge '=net-misc/openswan-1.0.6_rc1'
All Openswan 2.x users should upgrade to the latest stable version:
# emerge sync
# emerge -pv '>=net-misc/openswan-2.1.4'
# emerge '>=net-misc/openswan-2.1.4'
All strongSwan users should upgrade to the latest stable version:
# emerge sync
# emerge -pv '>=net-misc/strongswan-2.1.3'
# emerge '>=net-misc/strongswan-2.1.3'
All Super-FreeS/WAN users should migrate to the latest stable version of Openswan. Note that Portage will force a move for Super-FreeS/WAN users to Openswan.
# emerge sync
# emerge -pv '=net-misc/openswan-1.0.6_rc1'
# emerge '=net-misc/openswan-1.0.6_rc1'
http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200406-20 http://lists.openswan.org/pipermail/dev/2004-June/000370.html
Insight
FreeS/WAN, Openswan, strongSwan and Super-FreeS/WAN contain two bugs when authenticating PKCS#7 certificates. This could allow an attacker to authenticate with a fake certificate.
Severity
Classification
-
CVE CVE-2004-0590 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities