Displaying 3 results from an estimated 3 matches for "cvsweb2".
Did you mean:
cvsweb
2008 Feb 06
2
What about FreeBSD? - KAME Project "ipcomp6_input()" Denial of Service
...rror within the
"ipcomp6_input()" function in kame/sys/netinet6/ipcomp_input.c when
processing IPv6 packets with an IPComp header. This can be exploited
to crash a vulnerable system by sending a specially crafted IPv6
packet.
SOLUTION:
Fixed in the CVS repository.
http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.diff?r1=1.36;r2=1.37
PROVIDED AND/OR DISCOVERED BY:
US-CERT credits Shoichi Sakane.
NetBSD credits the Coverity Prevent analysis tool.
ORIGINAL ADVISORY:
US-CERT VU#110947:
http://www.kb.cert.org/vuls/id/110947
2004 Apr 07
0
Note to Racoon users (IKE/ISAKMP daemon)
...r aggressive mode, racoon does not verify the client's
RSA signature. Any installations using X.509 authentication are
strongly urged to upgrade.
Installations using pre-shared keys are believed to be unaffected.
References
CVE CAN-2004-0155
Name
URL http://www.kame.net/dev/cvsweb2.cgi/kame/kame/kame/racoon/
crypto_openssl.c?rev=1.84&content-type=text/x-cvsweb-markup
--
Jacques Vidrine / nectar@celabo.org / jvidrine@verio.net / nectar@freebsd.org
2008 Nov 14
3
FreeBSD 6.3 gre and traceroute
Stephen Clark wrote:
> Robert Noland wrote:
>> On Thu, 2008-11-13 at 07:48 -0500, Stephen Clark wrote:
>>> Julian Elischer wrote:
>>>> Stephen Clark wrote:
>>>>> Julian Elischer wrote:
>>>>>> you will need to define the setup and question better.
>>>> thanks.. cleaning it up a bit more...
>>>>
>>>>