Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.871682
Kategorie:Red Hat Local Security Checks
Titel:RedHat Update for libreswan RHSA-2016:2603-02
Zusammenfassung:The remote host is missing an update for the 'libreswan'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'libreswan'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Libreswan is an implementation of IPsec
& IKE for Linux. IPsec is the Internet Protocol Security and uses strong
cryptography to provide both authentication and encryption services. These
services allow you to build secure tunnels through untrusted networks such as
virtual private network (VPN).

Security Fix(es):

* A traffic amplification flaw was found in the Internet Key Exchange
version 1 (IKEv1) protocol. A remote attacker could use a libreswan server
with IKEv1 enabled in a network traffic amplification denial of service
attack against other hosts on the network by sending UDP packets with a
spoofed source address to that server. (CVE-2016-5361)

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.3 Release Notes linked from the References section.

Affected Software/OS:
libreswan on Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-5361
http://www.openwall.com/lists/oss-security/2016/06/10/4
https://lists.libreswan.org/pipermail/swan-dev/2016-March/001394.html
RedHat Security Advisories: RHSA-2016:2603
http://rhn.redhat.com/errata/RHSA-2016-2603.html
CopyrightCopyright (C) 2016 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.