-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ SCO Security Advisory Subject: UnixWare 7.1.4 : KAME Racoon Daemon Denial of Service Advisory number: SCOSA-2005.37 Issue date: 2005 September 09 Cross reference: sr893338 fz531604 erg712818 CAN-2005-0398 ______________________________________________________________________________ 1. Problem Description Racoon is an IKEv1 keying daemon, a common IPSec Utility. Due to a bug in the way the Racoon parsed incoming ISAKMP packets, an attacker could possibly crash the racoon daemon by sending a specially crafted ISAKMP packet. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0398 to this issue 2. Vulnerable Supported Versions System Binaries ---------------------------------------------------------------------- UnixWare 7.1.4 /usr/sbin/racoon 3. Solution The proper solution is to install the latest packages. 4. UnixWare 7.1.4 4.1 Location of Fixed Binaries ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.37 4.2 Verification MD5 (erg712818.uw714.pkg.Z) = 627dff359589e77e8aca23c7e4db72e6 md5 is available for download from ftp://ftp.sco.com/pub/security/tools 4.3 Installing Fixed Binaries Upgrade the affected binaries with the following sequence: Download erg712818.uw714.pkg.Z to the /var/spool/pkg directory # uncompress /var/spool/pkg/erg712818.uw714.pkg.Z # pkgadd -d /var/spool/pkg/erg712818.uw714.pkg 5. References Specific references for this advisory: none SCO security resources: http://www.sco.com/support/security/index.html SCO security advisories via email http://www.sco.com/support/forums/security.html This security fix closes SCO incidents sr893338 fz531604 erg712818. 6. Disclaimer SCO is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of SCO products. 7. Acknowledgments The SCO Group would like to thank Sebastian Krahmer for reporting this vulnerability. ______________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (SCO_SV) Comment: For info see http://www.gnupg.org iEYEARECAAYFAkMhcyIACgkQaqoBO7ipriEPpACgiLrq86RZmIr6RKyDB4YUg/Cg d14AnAps3ftatqvXMjM7I4Rt79aI6JZE =GTGM -----END PGP SIGNATURE-----