Package: miredo
Version: 1.0.4-1
Severity: important
Tags: Security

A vulnerability has been reported in Miredo, which can be exploited by 
malicious people to conduct spoofing attacks.
The vulnerability is caused due to an unspecified error in the authentication 
process of a Teredo Bubble using HMAC-MD5-64 hashing and can be exploited to 
impersonate an arbitrary Teredo client.
Successful exploitation requires knowledge of the primary IPv4 address of the 
victim's Teredo server and the victim's Teredo IPv6 address, which is made of 
the 
victim's public IPv4 address, the UDP port number, and cone NAT flag.
The vulnerability is reported in versions 0.9.8 through 1.0.5.

Solution:
Update to version 1.0.6.

http://secunia.com/advisories/23596/


-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-486
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)

-- 
   .''`.  
  : :' :    Alex de Oliveira Silva | enerv
  `. `'     www.enerv.net
    `- 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to