Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 490236 (CVE-2013-6075) - <net-misc/strongswan-5.1.1 : Two Denial of Service (CVE-2013-{6075,6076})
Summary: <net-misc/strongswan-5.1.1 : Two Denial of Service (CVE-2013-{6075,6076})
Status: RESOLVED FIXED
Alias: CVE-2013-6075
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-11-03 09:14 UTC by Agostino Sarubbo
Modified: 2014-02-02 18:29 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-11-03 09:14:45 UTC
From ${URL} :

A denial of service vulnerability was discovered in strongSwan's IKDE daemon charon.  This flaw can 
be triggered by a crafted ID_DER_ASN1_DN ID payload and is caused by an insufficient length check 
when comparing such identities.  This could cause a memory read outside specified boundaries or a 
NULL dereference which would result in an IKE daemon crash.  As no write operation is performed, 
code injection is unlikely.

As well, with a crafted ID payload, an attacker could impersonate a different user and get access 
to VPN connection profiles the victim would have access to.  However, this would require that the 
attacker successfully authenticate with appropriate credentials, and as such upstream indicates 
that it seems quite difficult to construct such an attack, although it may be possible.

strongSwan 5.1.1 corrects this flaw.  A patch [1] is provided for older releases.  All versions 
since 4.3.3 are affected.

[1] http://download.strongswan.org/security/CVE-2013-6075/


External References:

http://strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-(cve-2013-6075).html


@maintainer(s): since the fixed package is already in the tree, please say explicitly if it is ready for the stabilization or not.
Comment 1 Bjarke Istrup Pedersen (RETIRED) gentoo-dev 2013-11-03 11:37:03 UTC
I suggest stabilizing the 5.1.1 version, instead of patching the older version, since it fixes other bugs too, that people will benefit from :-)
Comment 2 Yury German Gentoo Infrastructure gentoo-dev 2013-11-03 13:55:02 UTC
(In reply to Bjarke Istrup Pedersen from comment #1)
> I suggest stabilizing the 5.1.1 version, instead of patching the older
> version, since it fixes other bugs too, that people will benefit from :-)

If that is where you would like to go and if you think we can create and stable build within the suggested time-line of 20 days then lets go with it.

Setting back to [ebuild] status, please let us know when ready for stabilization.
Comment 3 Agostino Sarubbo gentoo-dev 2013-11-03 16:55:04 UTC
(In reply to Yury German from comment #2)
> (In reply to Bjarke Istrup Pedersen from comment #1)
> > I suggest stabilizing the 5.1.1 version, instead of patching the older
> > version, since it fixes other bugs too, that people will benefit from :-)
> 
> If that is where you would like to go and if you think we can create and
> stable build within the suggested time-line of 20 days then lets go with it.
> 
> Setting back to [ebuild] status, please let us know when ready for
> stabilization.

He said that is fine.

Arches, please test and mark stable:
=net-misc/strongswan-5.1.1
Target keywords : "amd64 arm ppc x86"
Comment 4 Agostino Sarubbo gentoo-dev 2013-11-04 12:14:05 UTC
https://bugzilla.redhat.com/show_bug.cgi?id=1026152:

A NULL pointer dereference flaw was discovered in strongSwan's IKE daemon, charon. An attacker could use this flaw to crash charon by sending a specially-crafted IKEv1 fragmentation payload.

strongSwan 5.1.1 corrects this flaw. A patch is provided for versions 5.0.2 and newer:

http://download.strongswan.org/security/CVE-2013-6076/strongswan-5.0.2-5.1.0_ikev1_fragment.patch

External References:

http://strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-(cve-2013-6076).html
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2013-11-05 02:08:16 UTC
CVE-2013-6076 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6076):
  strongSwan 5.0.2 through 5.1.0 allows remote attackers to cause a denial of
  service (NULL pointer dereference and charon daemon crash) via a crafted
  IKEv1 fragmentation packet.

CVE-2013-6075 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6075):
  The compare_dn function in utils/identification.c in strongSwan 4.3.3
  through 5.1.1 allows (1) remote attackers to cause a denial of service
  (out-of-bounds read, NULL pointer dereference, and daemon crash) or (2)
  remote authenticated users to impersonate arbitrary users and bypass access
  restrictions via a crafted ID_DER_ASN1_DN ID, related to an "insufficient
  length check" during identity comparison.
Comment 6 Agostino Sarubbo gentoo-dev 2013-11-09 09:34:00 UTC
amd64 stable
Comment 7 Agostino Sarubbo gentoo-dev 2013-11-09 09:35:04 UTC
x86 stable
Comment 8 Agostino Sarubbo gentoo-dev 2013-11-10 07:56:12 UTC
arm stable
Comment 9 Agostino Sarubbo gentoo-dev 2013-11-10 07:56:21 UTC
ppc stable. Maintainer(s), please cleanup
Comment 10 Bjarke Istrup Pedersen (RETIRED) gentoo-dev 2013-11-10 11:24:14 UTC
Old version has been removed from the tree.
Comment 11 Chris Reffett (RETIRED) gentoo-dev Security 2013-12-03 19:24:56 UTC
GLSA vote: no.
Comment 12 Sergey Popov gentoo-dev 2014-02-02 18:29:05 UTC
GLSA vote: no

Closing as noglsa