Fedora Core 6 : ipsec-tools-0.6.5-8.fc6 (2007-665)

2007-08-28T00:00:00
ID FEDORA_2007-665.NASL
Type nessus
Reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
Modified 2019-12-02T00:00:00

Description

  • Mon Apr 23 2007 Steve Grubb <sgrubb at redhat.com> - 0.6.5-8

    • Upstream fix for Racoon DOS, informational delete must be encrypted

    • Resolves: rhbz#235388 - CVE-2007-1841 ipsec-tools racoon DoS

    • Fri Apr 20 2007 Steve Grubb <sgrubb at redhat.com> - 0.6.5-7

    • Resolves: #218386 labeled ipsec does not work over loopback

    • Mon Apr 16 2007 Steve Grubb <sgrubb at redhat.com> - 0.6.5-6.6

    • Related: #232508 add auditing to racoon

    • Sat Apr 14 2007 Steve Grubb <sgrubb at redhat.com> - 0.6.5-6.5

    • Resolves: #235680 racoon socket descriptor exhaustion

    • Thu Apr 12 2007 Steve Grubb <sgrubb at redhat.com> - 0.6.5-6.4

    • Resolves: #236121 increase buffer for context

    • Tue Apr 10 2007 Steve Grubb <sgrubb at redhat.com> - 0.6.5-6.3

    • Resolves: #234491 kernel sends ACQUIRES that racoon is not catching

    • Resolves: #218386 labeled ipsec does not work over loopback

    • Tue Mar 20 2007 Harald Hoyer <harald at redhat.com> - 0.6.5-6.2.fc6

    • fix for setting the security context into a proposal (32<->64bit)

    • Resolves: rhbz#232508

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

                                        
                                            #%NASL_MIN_LEVEL 80502
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Fedora Security Advisory 2007-665.
#

include("compat.inc");

if (description)
{
  script_id(25939);
  script_version ("1.13");
  script_cvs_date("Date: 2019/08/02 13:32:26");

  script_xref(name:"FEDORA", value:"2007-665");

  script_name(english:"Fedora Core 6 : ipsec-tools-0.6.5-8.fc6 (2007-665)");
  script_summary(english:"Checks rpm output for the updated packages.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Fedora Core host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"  - Mon Apr 23 2007 Steve Grubb &lt;sgrubb at redhat.com&gt; -
    0.6.5-8

    - Upstream fix for Racoon DOS, informational delete must
      be encrypted

    - Resolves: rhbz#235388 - CVE-2007-1841 ipsec-tools
      racoon DoS

    - Fri Apr 20 2007 Steve Grubb &lt;sgrubb at redhat.com&gt; -
      0.6.5-7

    - Resolves: #218386 labeled ipsec does not work over
      loopback

    - Mon Apr 16 2007 Steve Grubb &lt;sgrubb at redhat.com&gt; -
      0.6.5-6.6

    - Related: #232508 add auditing to racoon

    - Sat Apr 14 2007 Steve Grubb &lt;sgrubb at redhat.com&gt; -
      0.6.5-6.5

    - Resolves: #235680 racoon socket descriptor exhaustion

    - Thu Apr 12 2007 Steve Grubb &lt;sgrubb at redhat.com&gt; -
      0.6.5-6.4

    - Resolves: #236121 increase buffer for context

    - Tue Apr 10 2007 Steve Grubb &lt;sgrubb at redhat.com&gt; -
      0.6.5-6.3

    - Resolves: #234491 kernel sends ACQUIRES that racoon is
      not catching

    - Resolves: #218386 labeled ipsec does not work over
      loopback

    - Tue Mar 20 2007 Harald Hoyer &lt;harald at redhat.com&gt; -
      0.6.5-6.2.fc6

    - fix for setting the security context into a proposal
      (32&lt;-&gt;64bit)

    - Resolves: rhbz#232508

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
  );
  # https://lists.fedoraproject.org/pipermail/package-announce/2007-August/003416.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?f7f92fcd"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"Update the affected ipsec-tools and / or ipsec-tools-debuginfo
packages."
  );
  script_set_attribute(attribute:"risk_factor", value:"High");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:ipsec-tools");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:ipsec-tools-debuginfo");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora_core:6");

  script_set_attribute(attribute:"patch_publication_date", value:"2007/08/27");
  script_set_attribute(attribute:"plugin_publication_date", value:"2007/08/28");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.");
  script_family(english:"Fedora Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" &gt;!&lt; release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 6.x", "Fedora " + os_ver);

if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" &gt;!&lt; cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);

flag = 0;
if (rpm_check(release:"FC6", reference:"ipsec-tools-0.6.5-8.fc6")) flag++;
if (rpm_check(release:"FC6", reference:"ipsec-tools-debuginfo-0.6.5-8.fc6")) flag++;


if (flag)
{
  if (report_verbosity &gt; 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ipsec-tools / ipsec-tools-debuginfo");
}