Lucene search

K
mageiaGentoo FoundationMGASA-2014-0277
HistoryJun 27, 2014 - 7:38 p.m.

Updated iodine packages fix CVE-2014-4168

2014-06-2719:38:38
Gentoo Foundation
advisories.mageia.org
6

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.025 Low

EPSS

Percentile

90.3%

Updated iodine packages fix security vulnerability: Oscar Reparaz discovered an authentication bypass vulnerability in iodine, a tool for tunneling IPv4 data through a DNS server. A remote attacker could provoke a server to accept the rest of the setup or also network traffic by exploiting this flaw (CVE-2014-4168).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchiodine< 0.6.0-0.rc1.3iodine-0.6.0-0.rc1.3.mga3
Mageia4noarchiodine< 0.6.0-0.rc1.4iodine-0.6.0-0.rc1.4.mga4

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.025 Low

EPSS

Percentile

90.3%