OpenBSD Journal

[Patch 015] isakmpd

Contributed by jose on from the memory-corruption dept.

Several bugs have been found in the ISAKMP daemon which can lead to memory leaks and a remote denial of service condition. An attacker can craft malformed payloads that can cause the isakmpd(8) process to stop processing requests. This is being released as a reliability fix.

The problem is fixed in -current, 3.4-stable and 3.3-stable.

Patches are available at:

ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/015_isakmpd2.patch
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/020_isakmpd2.patch

(Comments are closed)


Comments
  1. By Chad Loder () on

    That CVE number is for the recent OpenSSL issues. It has nothing to do with isakmpd.

    Comments

Credits

Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]