From rea-fbsd@codelabs.ru  Sat Dec  6 17:40:43 2008
Return-Path: <rea-fbsd@codelabs.ru>
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34])
	by hub.freebsd.org (Postfix) with ESMTP id 9449C106564A
	for <FreeBSD-gnats-submit@freebsd.org>; Sat,  6 Dec 2008 17:40:43 +0000 (UTC)
	(envelope-from rea-fbsd@codelabs.ru)
Received: from 0.mx.codelabs.ru (0.mx.codelabs.ru [144.206.177.45])
	by mx1.freebsd.org (Postfix) with ESMTP id 47E3D8FC08
	for <FreeBSD-gnats-submit@freebsd.org>; Sat,  6 Dec 2008 17:40:42 +0000 (UTC)
	(envelope-from rea-fbsd@codelabs.ru)
Received: from phoenix.codelabs.ru (ppp91-78-250-32.pppoe.mtu-net.ru [91.78.250.32])
	by 0.mx.codelabs.ru with esmtps (TLSv1:CAMELLIA256-SHA:256)
	id 1L918z-000B1H-8G for FreeBSD-gnats-submit@freebsd.org; Sat, 06 Dec 2008 20:40:41 +0300
Message-Id: <20081206174049.274EDB8019@phoenix.codelabs.ru>
Date: Sat,  6 Dec 2008 20:40:49 +0300 (MSK)
From: Eygene Ryabinkin <rea-fbsd@codelabs.ru>
Reply-To: Eygene Ryabinkin <rea-fbsd@codelabs.ru>
To: FreeBSD-gnats-submit@freebsd.org
Cc:
Subject: [vuxml] security/ipsec-tools: document CVE-2008-3651 and CVE-2008-3652
X-Send-Pr-Version: 3.113
X-GNATS-Notify: vanhu@netasq.com vanhu@netasq.com

>Number:         129468
>Category:       ports
>Synopsis:       [vuxml] security/ipsec-tools: document CVE-2008-3651 and CVE-2008-3652
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    wxs
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Sat Dec 06 17:50:00 UTC 2008
>Closed-Date:    Wed Jan 21 19:44:24 UTC 2009
>Last-Modified:  Wed Jan 21 19:50:00 UTC 2009
>Originator:     Eygene Ryabinkin
>Release:        FreeBSD 7.1-PRERELEASE amd64
>Organization:
Code Labs
>Environment:

System: FreeBSD 7.1-PRERELEASE amd64

>Description:

Two remotely-exploitable vulnerabilities that can cause DoS were found
in ipsec-tools before 0.7.1.  The port was updated in Jul 2008, but no
VuXML entry was submitted.

>How-To-Repeat:

http://www.securityfocus.com/bid/30657/info

>Fix:

The following VuXML entry should be evaluated and added:
--- vuln.xml begins here ---
  <vuln vid="8c46a4c4-c3b7-11dd-b08d-001fc66e7203">
    <topic>ipsec-tools -- two DoS attacks</topic>
    <affects>
      <package>
        <name>ipsec-tools</name>
        <range><lt>0.7.1</lt></range>
      </package>
    </affects>
    <description>
      <body xmlns="http://www.w3.org/1999/xhtml">
        <p>Two Denial of Service vulnerabilities that could allow a
        remote attacker to consume all available memory were discovered
        by vendor:</p>
        <blockquote
          cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3651">
          <p>Memory leak in racoon/proposal.c in the racoon daemon in
          ipsec-tools before 0.7.1 allows remote authenticated users to
          cause a denial of service (memory consumption) via invalid
          proposals.</p>
        </blockquote>
        <blockquote
          cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3652">
          <p>src/racoon/handler.c in racoon in ipsec-tools does not
          remove an "orphaned ph1" (phase 1) handle when it has been
          initiated remotely, which allows remote attackers to cause a
          denial of service (resource consumption).</p>
        </blockquote>
      </body>
    </description>
    <references>
      <cvename>CVE-2008-3651</cvename>
      <cvename>CVE-2008-3652</cvename>
      <bid>30657</bid>
      <mlist msgid="20080724084529.GA3768@zen.inc">http://marc.info/?l=ipsec-tools-devel&amp;m=121688914101709&amp;w=2</mlist>
    </references>
    <dates>
      <discovery>24-07-2008</discovery>
      <entry>TODAY</entry>
    </dates>
  </vuln>
--- vuln.xml ends here ---
>Release-Note:
>Audit-Trail:
Responsible-Changed-From-To: freebsd-ports-bugs->miwi 
Responsible-Changed-By: edwin 
Responsible-Changed-When: Sat Dec 6 17:50:12 UTC 2008 
Responsible-Changed-Why:  
miwi@ wants his PRs (via the GNATS Auto Assign Tool) 

http://www.freebsd.org/cgi/query-pr.cgi?pr=129468 
State-Changed-From-To: open->feedback 
State-Changed-By: edwin 
State-Changed-When: Sat Dec 6 17:50:15 UTC 2008 
State-Changed-Why:  
Awaiting maintainers feedback (via the GNATS Auto Assign Tool) 

http://www.freebsd.org/cgi/query-pr.cgi?pr=129468 

From: Edwin Groothuis <edwin@FreeBSD.org>
To: vanhu@netasq.com
Cc: bug-followup@FreeBSD.org
Subject: Re: ports/129468: [vuxml] security/ipsec-tools: document CVE-2008-3651 and CVE-2008-3652
Date: Sat, 6 Dec 2008 17:50:14 UT

 Maintainer of security/ipsec-tools,
 
 Please note that PR ports/129468 has just been submitted.
 
 If it contains a patch for an upgrade, an enhancement or a bug fix
 you agree on, reply to this email stating that you approve the patch
 and a committer will take care of it.
 
 The full text of the PR can be found at:
     http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/129468
 
 -- 
 Edwin Groothuis via the GNATS Auto Assign Tool
 edwin@FreeBSD.org

From: VANHULLEBUS Yvan <yvan.vanhullebus@netasq.com>
To: Eygene Ryabinkin <rea-fbsd@codelabs.ru>
Cc: FreeBSD-gnats-submit@FreeBSD.org
Subject: Re: ports/129468: [vuxml] security/ipsec-tools: document
	CVE-2008-3651 and CVE-2008-3652
Date: Mon, 8 Dec 2008 17:24:44 +0100

 --RnlQjJ0d97Da+TV1
 Content-Type: text/plain; charset=us-ascii
 Content-Disposition: inline
 Content-Transfer-Encoding: quoted-printable
 
 Hi.
 
 On Sat, Dec 06, 2008 at 08:40:49PM +0300, Eygene Ryabinkin wrote:
 [....]
 > >Fix:
 >=20
 > The following VuXML entry should be evaluated and added:
 [...]
 
 I can't tell you if the syntax is good, but I can confirm that the
 text description is a quite good condensed explanation of the problems
 (which would need much more text if we want a more accurate
 description).
 
 
 Yvan.
 
 --=20
 NETASQ
 http://www.netasq.com
 
 --RnlQjJ0d97Da+TV1
 Content-Type: application/x-pkcs7-signature
 Content-Disposition: attachment; filename="smime.p7s"
 Content-Transfer-Encoding: base64
 
 MIINOgYJKoZIhvcNAQcCoIINKzCCDScCAQExCzAJBgUrDgMCGgUAMAsGCSqGSIb3DQEHAaCC
 CoYwggZ8MIIFZKADAgECAgpwxrFIFmvykGpdMA0GCSqGSIb3DQEBBAUAMIGRMQswCQYDVQQG
 EwJGUjENMAsGA1UECBMETm9yZDEaMBgGA1UEBxMRVmlsbGVuZXV2ZSBkJ0FzY3ExLjAsBgNV
 BAoTJU5FVEFTUSAtIFNlY3VyZSBJbnRlcm5ldCBDb25uZWN0aXZpdHkxJzAlBgNVBAsTHk5F
 VEFTUSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNzA3MTYwOTU4MDhaFw0wOTA3MTUw
 OTU4MDhaMIHYMQswCQYDVQQGFAJGUjENMAsGA1UECBQETm9yZDEuMCwGA1UEChQlTkVUQVNR
 IC0gU2VjdXJlIEludGVybmV0IENvbm5lY3Rpdml0eTEnMCUGA1UECxQeTkVUQVNRIENlcnRp
 ZmljYXRpb24gQXV0aG9yaXR5MRowGAYDVQQHFBFWaWxsZW5ldXZlIGQnQXNjcTEZMBcGA1UE
 AxQQeXZhbiBWQU5IVUxMRUJVUzEqMCgGCSqGSIb3DQEJARYbeXZhbi52YW5odWxsZWJ1c0Bu
 ZXRhc3EuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArqZ+vhct7xUvoDOL
 yI6I/WS8H1qx5M31ECuEzMpO7dNEAeEnjQ0SsmgqJi0IUvlsnHQaOuMhzLMACThad5Z9cA2B
 tg7d9qk9cOU40BNL3L14qROaoowCKqPG9uNMtCaQM3p5iMnIbud4Z+gvoezjlOSVzLH6Brcp
 HC1iKAfPb2JI0xqWlvVRT+nOhdG+hEtPSKeGQaniSCcUFRsdyKB20qZVNCXNXskOiJoAohp6
 mPopsAEnuitFE+u8ps9Pdly8N+BLMIKGzO5aEg0vxUX2UMN0kBBrLopmIj1ed+NOZKEshiKS
 20Bqz24725Uh0Fn/9PftjFiBY6hFiJKU4CQ2QwIDAQABo4ICizCCAocwDAYDVR0TAQH/BAIw
 ADAdBgNVHQ4EFgQUq8DCXoQV2AIeiRLvzDPubbew5Dgwgb4GA1UdIwSBtjCBs4AUJyrrHdlE
 2joXc2oJICDJJaj5f7KhgZekgZQwgZExCzAJBgNVBAYTAkZSMQ0wCwYDVQQIEwROb3JkMRow
 GAYDVQQHExFWaWxsZW5ldXZlIGQnQXNjcTEuMCwGA1UEChMlTkVUQVNRIC0gU2VjdXJlIElu
 dGVybmV0IENvbm5lY3Rpdml0eTEnMCUGA1UECxMeTkVUQVNRIENlcnRpZmljYXRpb24gQXV0
 aG9yaXR5ggEAMA4GA1UdDwEB/wQEAwIF4DARBglghkgBhvhCAQEEBAMCBaAwKwYJKwYBBAGC
 NxQCBB4eHABTAG0AYQByAHQAYwBhAHIAZABMAG8AZwBvAG4wKQYDVR0lBCIwIAYIKwYBBQUH
 AwQGCCsGAQUFBwMCBgorBgEEAYI3FAICMCsGA1UdEQQkMCKgIAYKKwYBBAGCNxQCA6ASDBB5
 dmFudkBuZXRhc3EuY29tMIHNBgNVHR8EgcUwgcIwWqBYoFaGVGxkYXA6Ly9wa2kubmV0YXNx
 LmNvbS9jbj1md2NhLG91PWNhcyxvPW5ldGFzcSxkYz1mcj9jZXJ0aWZpY2F0ZVJldm9jYXRp
 b25MaXN0O2JpbmFyeTA4oDagNIYyaHR0cDovL2ludHJhbmV0Lm5ldGFzcS5jb20vaW50cmFu
 ZXQvcGtpL25ldGFzcS5jcmwwKqAooCaGJGh0dHA6Ly93d3cubmV0YXNxLmNvbS9wa2kvbmV0
 YXNxLmNybDAfBglghkgBhvhCAQ0EEhYQVXNlciBDZXJ0aWZpY2F0ZTANBgkqhkiG9w0BAQQF
 AAOCAQEAUiSvrad7pGSGQblLF8U9SwjSelyRYicqihVnWKHoHZ3kRYI6QoVRcZlStDegZ+yU
 CLOoRGF+KCMnZzP7YfxqucdB06i/deP26R7YHK/4vjOSvIyfT2Z/wspPQqYCkqq3BwcbJ4Fz
 3KK1mqkxcevTuLSugcaaYC6csbxfVa12UN47+3Cd37ViHU2L1z1GunY5dzCW1CaZEqJ5YvD4
 x0ylsCDuxifp7uEw1bc1fXMC3XPO1Nlf6SAVcqn4u+jNL812jwndPg6C6WdUXDwAV6KHzxCA
 dVH+6AoV5tU2TScdXGCk8/AzwxVKCo9SdwvQut57ko20FFx5xFRJV7F49k/EWjCCBAIwggLq
 oAMCAQICAQAwDQYJKoZIhvcNAQEEBQAwgZExCzAJBgNVBAYTAkZSMQ0wCwYDVQQIEwROb3Jk
 MRowGAYDVQQHExFWaWxsZW5ldXZlIGQnQXNjcTEuMCwGA1UEChMlTkVUQVNRIC0gU2VjdXJl
 IEludGVybmV0IENvbm5lY3Rpdml0eTEnMCUGA1UECxMeTkVUQVNRIENlcnRpZmljYXRpb24g
 QXV0aG9yaXR5MB4XDTAyMDIxOTEyMzQ1NVoXDTIyMDIxNDEyMzQ1NVowgZExCzAJBgNVBAYT
 AkZSMQ0wCwYDVQQIEwROb3JkMRowGAYDVQQHExFWaWxsZW5ldXZlIGQnQXNjcTEuMCwGA1UE
 ChMlTkVUQVNRIC0gU2VjdXJlIEludGVybmV0IENvbm5lY3Rpdml0eTEnMCUGA1UECxMeTkVU
 QVNRIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
 CgKCAQEAwYBPi3ref6t0tuJMoj5R4H7sa+WMSZwDh4XHjZV5e6P6LObyrleC6oNFDZJrgBtK
 k9Swzfnnf4m3xc0QS9kKCPLFwLpmIK3RCx0K4YYi+uBrrL347kH4UPfrI6KvrYcFpG3YwFZU
 K+7LZn/Y9HSB6n4gvdiCk7cmkuFr1ifFtDYZqktNUss9yQCPqh0d9dXfuhRV8vyggvVkcfTZ
 cCyVpRaDYaDm0j30Urba62KsKxfh6cEAt6kmPUxviGVaoEiiaABDZVSu6PjS17qDcZaQzlnw
 hLacKyM1zR7+lvfFR03/h6m8JYGBPMP7zccH2uJfufh+Of3AvOfCFZFcNhzHCwIDAQABo2Mw
 YTAdBgNVHQ4EFgQUJyrrHdlE2joXc2oJICDJJaj5f7IwHwYDVR0jBBgwFoAUJyrrHdlE2joX
 c2oJICDJJaj5f7IwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcN
 AQEEBQADggEBAJclqFN/WqYmhcZlXabrw6KJQNq/TK6TLDHzwZVcyjn0QhujHRr+EcVpaE1p
 IS4fjsywzpINE3fe9DSlC4IzyeqDq3EtM4eQDSXm4YRGLZp8X2M5TdccmxlElDgZzlVXMOlo
 /Ehhh4vqzSbc1M4FEfETiEV+vLX5MaWEHH8dmzlEL632mOme19QJN6BQKJPmCCj1VbxJDrJS
 pF01kXFJUtyrA0ilrEG0mA+FLFjfsWuZXzYEPjv1/FIPMlSnCCiW8ZSzwstQX2BhLEi0ugZJ
 RpakVMY/TkdoLEErYt0mjZD+d/oXFR7QNzMxAHpDEPmlZRotP1W7sO6kpBP7lyh/Yc4xggJ8
 MIICeAIBATCBoDCBkTELMAkGA1UEBhMCRlIxDTALBgNVBAgTBE5vcmQxGjAYBgNVBAcTEVZp
 bGxlbmV1dmUgZCdBc2NxMS4wLAYDVQQKEyVORVRBU1EgLSBTZWN1cmUgSW50ZXJuZXQgQ29u
 bmVjdGl2aXR5MScwJQYDVQQLEx5ORVRBU1EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkCCnDG
 sUgWa/KQal0wCQYFKw4DAhoFAKCBsTAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqG
 SIb3DQEJBTEPFw0wODEyMDgxNjI0NDRaMCMGCSqGSIb3DQEJBDEWBBSzsV397GVl9npVMiL3
 RT5BvdxQtjBSBgkqhkiG9w0BCQ8xRTBDMAoGCCqGSIb3DQMHMA4GCCqGSIb3DQMCAgIAgDAN
 BggqhkiG9w0DAgIBQDAHBgUrDgMCBzANBggqhkiG9w0DAgIBKDANBgkqhkiG9w0BAQEFAASC
 AQANGxupl8TdahJd3ss/Ob/JJAVBehc+9cdxji2fE7XtKnEy1ZgJwddrAfzA29hEYLaDWQWj
 O39YqVQQ02w0sD+okOJrNZ4VH42ruLWawgOsCE5fwWi9FJQZiJ4L2jtm/m7kLfoEgwcssfmC
 n3Kj6D+R1jOttOOlGIFhblnzP9mlmcEoRBoaqo72IghIvkj6dmNh+5qjWH00//mOS9RyESlF
 WvLiFq2McxNVr3jMlQCiZPx7swCUKEAMPcqobLiYvIeEvZDKSME55BU4pTHv270HWaODBhWu
 Fd8WhdA58K88Q1MEGMIfeJkNDiVUQ8cW6BzHEFZyGeCgWpOb/9OeUlLi
 
 --RnlQjJ0d97Da+TV1--

From: Eygene Ryabinkin <rea-fbsd@codelabs.ru>
To: VANHULLEBUS Yvan <yvan.vanhullebus@netasq.com>
Cc: FreeBSD-gnats-submit@FreeBSD.org
Subject: Re: ports/129468: [vuxml] security/ipsec-tools: document
	CVE-2008-3651 and CVE-2008-3652
Date: Mon, 8 Dec 2008 20:03:02 +0300

 --w2xx78T4DcG3O+DJ
 Content-Type: text/plain; charset=koi8-r
 Content-Disposition: inline
 Content-Transfer-Encoding: quoted-printable
 
 Yvan, good day.
 
 Mon, Dec 08, 2008 at 05:24:44PM +0100, VANHULLEBUS Yvan wrote:
 > On Sat, Dec 06, 2008 at 08:40:49PM +0300, Eygene Ryabinkin wrote:
 > [....]
 > > >Fix:
 > >=20
 > > The following VuXML entry should be evaluated and added:
 > [...]
 >=20
 > I can't tell you if the syntax is good,
 
 It passes 'make validate' inside security/vuxml.
 
 > but I can confirm that the
 > text description is a quite good condensed explanation of the problems
 > (which would need much more text if we want a more accurate
 > description).
 
 I think that the condenced explanation is the best for the VuXML entry.
 However, if you have some links to the more detailed explanations, I am
 all ears -- it will be good to add them to the VuXML References section.
 
 Thanks!
 --=20
 Eygene
  _                ___       _.--.   #
  \`.|\..----...-'`   `-._.-'_.-'`   #  Remember that it is hard
  /  ' `         ,       __.--'      #  to read the on-line manual  =20
  )/' _/     \   `-_,   /            #  while single-stepping the kernel.
  `-'" `"\_  ,_.-;_.-\_ ',  fsc/as   #
      _.-'_./   {_.'   ; /           #    -- FreeBSD Developers handbook=20
     {_.-``-'         {_/            #
 
 --w2xx78T4DcG3O+DJ
 Content-Type: application/pgp-signature
 Content-Disposition: inline
 
 -----BEGIN PGP SIGNATURE-----
 Version: GnuPG v2.0.9 (FreeBSD)
 
 iEYEARECAAYFAkk9U0UACgkQthUKNsbL7YiVLACfSrF1q+751GXBv9d0LrErv8WC
 yHwAniMpvQU1Ocwn17A6rsYiv5Rd7pAn
 =7y5T
 -----END PGP SIGNATURE-----
 
 --w2xx78T4DcG3O+DJ--
Responsible-Changed-From-To: miwi->wxs 
Responsible-Changed-By: wxs 
Responsible-Changed-When: Sun Jan 18 14:27:40 UTC 2009 
Responsible-Changed-Why:  
I'll take it. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=129468 
State-Changed-From-To: feedback->closed 
State-Changed-By: wxs 
State-Changed-When: Wed Jan 21 19:44:23 UTC 2009 
State-Changed-Why:  
Committed. Thanks! 

http://www.freebsd.org/cgi/query-pr.cgi?pr=129468 

From: dfilter@FreeBSD.ORG (dfilter service)
To: bug-followup@FreeBSD.org
Cc:  
Subject: Re: ports/129468: commit references a PR
Date: Wed, 21 Jan 2009 19:44:30 +0000 (UTC)

 wxs         2009-01-21 19:44:15 UTC
 
   FreeBSD ports repository
 
   Modified files:
     security/vuxml       vuln.xml 
   Log:
   - Document two old ipsec-tools DoS
   
   PR:             ports/129468
   Submitted by:   Eygene Ryabinkin <rea-fbsd@codelabs.ru>
   
   Revision  Changes    Path
   1.1829    +33 -1     ports/security/vuxml/vuln.xml
 _______________________________________________
 cvs-all@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/cvs-all
 To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
 
>Unformatted:
