Package: miredo Version: 1.0.4-1 Severity: important Tags: Security
A vulnerability has been reported in Miredo, which can be exploited by malicious people to conduct spoofing attacks. The vulnerability is caused due to an unspecified error in the authentication process of a Teredo Bubble using HMAC-MD5-64 hashing and can be exploited to impersonate an arbitrary Teredo client. Successful exploitation requires knowledge of the primary IPv4 address of the victim's Teredo server and the victim's Teredo IPv6 address, which is made of the victim's public IPv4 address, the UDP port number, and cone NAT flag. The vulnerability is reported in versions 0.9.8 through 1.0.5. Solution: Update to version 1.0.6. http://secunia.com/advisories/23596/ -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-3-486 Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8) -- .''`. : :' : Alex de Oliveira Silva | enerv `. `' www.enerv.net `- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]