Headline
CVE-2018-16738: Debian -- Security Information -- DSA-4312-1 tinc
tinc 1.0.30 through 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1.
Debian Security Advisory
Date Reported:
08 Oct 2018
Affected Packages:
tinc
Vulnerable:
Yes
Security database references:
In Mitre’s CVE dictionary: CVE-2018-16738, CVE-2018-16758.
More information:
Several vulnerabilities were discovered in tinc, a Virtual Private Network (VPN) daemon. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2018-16738
Michael Yonli discovered a flaw in the implementation of the authentication protocol that could allow a remote attacker to establish an authenticated, one-way connection with another node.
CVE-2018-16758
Michael Yonli discovered that a man-in-the-middle that has intercepted a TCP connection might be able to disable encryption of UDP packets sent by a node.
For the stable distribution (stretch), these problems have been fixed in version 1.0.31-1+deb9u1.
We recommend that you upgrade your tinc packages.
For the detailed security status of tinc please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tinc