Lucene search

K
debianDebianDEBIAN:DSA-2495-1:0E88C
HistoryJun 16, 2012 - 3:51 p.m.

[SECURITY] [DSA 2495-1] openconnect security update

2012-06-1615:51:42
lists.debian.org
8

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

6.3

Confidence

Low

EPSS

0.006

Percentile

78.5%


Debian Security Advisory DSA-2495-1 [email protected]
http://www.debian.org/security/ Moritz Muehlenhoff
June 16, 2012 http://www.debian.org/security/faq


Package : openconnect
Vulnerability : buffer overflow
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-3291

A buffer overflow was discovered in OpenConnect, a client for the Cisco
AnyConnect VPN, which could result in denial of service.

For the stable distribution (squeeze), this problem has been fixed in
version 2.25-0.1+squeeze1.

For the unstable distribution (sid), this problem has been fixed in
version 3.18-1.

We recommend that you upgrade your openconnect packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: [email protected]

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

6.3

Confidence

Low

EPSS

0.006

Percentile

78.5%