Secunia Security Advisory - Mandriva has issued an update for ipsec-tools. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
ed116a6f6df49e3a0a632db4010f49ba64db295bdb92b49651088b0594e66309
TITLE:
Mandriva update for ipsec-tools
SECUNIA ADVISORY ID:
SA18616
VERIFY ADVISORY:
http://secunia.com/advisories/18616/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
OPERATING SYSTEM:
Mandrakelinux 10.1
http://secunia.com/product/4198/
DESCRIPTION:
Mandriva has issued an update for ipsec-tools. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).
For more information:
SA17668
SOLUTION:
Apply updated packages.
Mandrakelinux 10.1:
c1f74be6f3c46152881ded66022a3928
10.1/RPMS/ipsec-tools-0.2.5-2.2.101mdk.i586.rpm
c8416853386be9e80b5f8ac6de16cf93
10.1/RPMS/libipsec-tools0-0.2.5-2.2.101mdk.i586.rpm
278751ee3fca05321059c67f39f1a0f0
10.1/SRPMS/ipsec-tools-0.2.5-2.2.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
5d3d19d02d0d5a8eb5fcc237768fb07f
x86_64/10.1/RPMS/ipsec-tools-0.2.5-2.2.101mdk.x86_64.rpm
464dadc90a736f6312a6c143c12a4cce
x86_64/10.1/RPMS/lib64ipsec-tools0-0.2.5-2.2.101mdk.x86_64.rpm
278751ee3fca05321059c67f39f1a0f0
x86_64/10.1/SRPMS/ipsec-tools-0.2.5-2.2.101mdk.src.rpm
ORIGINAL ADVISORY:
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:020
OTHER REFERENCES:
SA17668:
http://secunia.com/advisories/17668/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------