Gentoo Archives: gentoo-announce

From: Sean Amoss <ackle@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-announce] [ GLSA 201405-18 ] OpenConnect: User-assisted execution of arbitrary code
Date: Sun, 18 May 2014 11:59:47
Message-Id: 5378A038.8080900@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201405-18
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: OpenConnect: User-assisted execution of arbitrary code
9 Date: May 18, 2014
10 Bugs: #457068
11 ID: 201405-18
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A buffer overflow in OpenConnect could result in execution of arbitrary
19 code or Denial of Service.
20
21 Background
22 ==========
23
24 OpenConnect is a free client for Cisco AnyConnect SSL VPN software.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 net-misc/openconnect < 4.08 >= 4.08
33
34 Description
35 ===========
36
37 A stack-based buffer overflow error has been discovered in OpenConnect.
38
39 Impact
40 ======
41
42 A remote attacker could entice a user to connect to a malicious VPN
43 server, possibly resulting in execution of arbitrary code with the
44 privileges of the process, or a Denial of Service condition.
45
46 Workaround
47 ==========
48
49 There is no known workaround at this time.
50
51 Resolution
52 ==========
53
54 All OpenConnect users should upgrade to the latest version:
55
56 # emerge --sync
57 # emerge --ask --oneshot --verbose ">=net-misc/openconnect-4.08"
58
59 References
60 ==========
61
62 [ 1 ] CVE-2012-6128
63 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6128
64
65 Availability
66 ============
67
68 This GLSA and any updates to it are available for viewing at
69 the Gentoo Security Website:
70
71 http://security.gentoo.org/glsa/glsa-201405-18.xml
72
73 Concerns?
74 =========
75
76 Security is a primary focus of Gentoo Linux and ensuring the
77 confidentiality and security of our users' machines is of utmost
78 importance to us. Any security concerns should be addressed to
79 security@g.o or alternatively, you may file a bug at
80 https://bugs.gentoo.org.
81
82 License
83 =======
84
85 Copyright 2014 Gentoo Foundation, Inc; referenced text
86 belongs to its owner(s).
87
88 The contents of this document are licensed under the
89 Creative Commons - Attribution / Share Alike license.
90
91 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature