[24700] in bugtraq

home help back first fref pref prev next nref lref last post

RE: [Whitehat] about zlib vulnerability

daemon@ATHENA.MIT.EDU (Peter Mueller)
Fri Mar 15 14:42:13 2002

Message-ID: <37328159548B4242A34141B1A69CDB7303270E@exchange.sidestep.com>
From: Peter Mueller <pmueller@sidestep.com>
To: bugtraq@securityfocus.com
Cc: "'tele'" <tele@duepi.it>
Date: Thu, 14 Mar 2002 18:47:50 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"

> The vulnerable zlib 1.1.3 code can be even found on the freeswan
> 1.95 source tree and previous versions, therefore there's a
> potential vulnerability at kernel level; besides at the web site
> http://www.freeswan.org the problem is not properly treated.

From the developers @ freeswan:
<snip>
It is not of great importance to VPN applications, since compressed
packets don't get fed to zlib until they've passed authentication.  It's a
little more serious for opportunistic encryption, where the tunnel doesn't
imply trust... but our experimental OE setup currently isn't proposing or
accepting compression. 
</snip>

Zlib apparently is not called into play unless the "compress=yes" option is
turned on.  This feature could be individual to each tunnel or globally set
for all tunnels.  default = no.  Additionally in order for zlib to even be
accessed you have to authenticate an IPsec session. 

FYI, "opportunistic encryption" means using DNS to accomplish IPsec gateways
without hard-coding ipsec setup information into some configuration file.
It's currently still very experimental and thus not used in any production
environments.

Hope that helps,

Peter


home help back first fref pref prev next nref lref last post