Vulnerabilities > CVE-2005-0398 - Denial of Service vulnerability in KAME Racoon Malformed ISAKMP Packet Headers

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
ipsec-tools
kame
sgi
altlinux
redhat
suse
nessus

Summary

The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets.

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_SA_2005_020.NASL
    descriptionThe remote host is missing the patch for the advisory SUSE-SA:2005:020 (ipsec-tools). Racoon is a ISAKMP key management daemon used in IPsec setups. Sebastian Krahmer of the SUSE Security Team audited the daemon and found that it handles certain ISAKMP messages in a slightly wrong way, so that remote attackers can crash it via malformed ISAKMP packages. This update fixes this problem. This is tracked by the Mitre CVE ID CVE-2005-0398.
    last seen2020-06-01
    modified2020-06-02
    plugin id17671
    published2005-04-01
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/17671
    titleSUSE-SA:2005:020: ipsec-tools
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2005-216.NASL
    descriptionThis update fixes a potential DoS in parsing ISAKMP headers in racoon. (CVE-2005-0398) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id18314
    published2005-05-19
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/18314
    titleFedora Core 2 : ipsec-tools-0.5-2.fc2 (2005-216)
  • NASL familyDenial of Service
    NASL idRACOON_ISAKMP_DOS.NASL
    descriptionThe remote IPSEC server seems to have a problem negotiating malformed ISAKMP packets. An attacker may use this flaw to crash the remote host repeatedly and disable your VPN remotely.
    last seen2020-06-01
    modified2020-06-02
    plugin id17655
    published2005-03-30
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/17655
    titleipsec-tools KAME racoon Daemon ISAKMP Header Parsing Remote DoS
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2005-232.NASL
    descriptionAn updated ipsec-tools package that fixes a bug in parsing of ISAKMP headers is now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The ipsec-tools package is used in conjunction with the IPsec functionality in the linux kernel. The ipsec-tools package includes : - setkey, a program to directly manipulate policies and SAs - racoon, an IKEv1 keying daemon A bug was found in the way the racoon daemon handled incoming ISAKMP requests. It is possible that an attacker could crash the racoon daemon by sending a specially crafted ISAKMP packet. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0398 to this issue. Additionally, the following issues have been fixed: - racoon mishandled restarts in the presence of stale administration sockets. - on Red Hat Enterprise Linux 4, racoon and setkey did not properly set up forward policies, which prevented tunnels from working. Users of ipsec-tools should upgrade to this updated package, which contains backported patches, and is not vulnerable to these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id17622
    published2005-03-25
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/17622
    titleRHEL 3 / 4 : ipsec-tools (RHSA-2005:232)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_3B260179E464460DBF9FD5CDA6204020.NASL
    descriptionSebastian Krahmer discovered that the racoon ISAKMP daemon could be crashed with a maliciously crafted UDP packet. No authentication is required in order to perform the attack.
    last seen2020-06-01
    modified2020-06-02
    plugin id18903
    published2005-07-13
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/18903
    titleFreeBSD : racoon -- remote denial-of-service (3b260179-e464-460d-bf9f-d5cda6204020)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-107-1.NASL
    descriptionSebastian Krahmer discovered a Denial of Service vulnerability in the racoon daemon. By sending specially crafted ISAKMP packets, a remote attacker could trigger a buffer overflow which caused racoon to crash. This update does not introduce any source code changes affecting the ipsec-tools package. It is necessary to update the version number of the package in order to support an update to the
    last seen2020-06-01
    modified2020-06-02
    plugin id20493
    published2006-01-15
    reporterUbuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20493
    titleUbuntu 4.10 : ipsec-tools vulnerability (USN-107-1)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2005-062.NASL
    descriptionA bug was discovered in the way that the racoon daemon handled incoming ISAKMP requests. It is possible that an attacker could crash the racoon daemon by sending a specially crafted ISAKMP packet. The updated packages have been patched to correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id17668
    published2005-04-01
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/17668
    titleMandrake Linux Security Advisory : ipsec-tools (MDKSA-2005:062)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2005-217.NASL
    descriptionThis update fixes a potential DoS in parsing ISAKMP headers in racoon. (CVE-2005-0398) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id19627
    published2005-09-12
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19627
    titleFedora Core 3 : ipsec-tools-0.5-2.fc3 (2005-217)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200503-33.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200503-33 (IPsec-Tools: racoon Denial of Service) Sebastian Krahmer has reported a potential remote Denial of Service vulnerability in the ISAKMP header parsing code of racoon. Impact : An attacker could possibly cause a Denial of Service of racoon using a specially crafted ISAKMP packet. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id17642
    published2005-03-29
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/17642
    titleGLSA-200503-33 : IPsec-Tools: racoon Denial of Service

Oval

accepted2013-04-29T04:00:37.776-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
    ovaloval:org.mitre.oval:def:11782
  • commentCentOS Linux 3.x
    ovaloval:org.mitre.oval:def:16651
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
descriptionThe KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets.
familyunix
idoval:org.mitre.oval:def:10028
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleThe KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets.
version26

Redhat

advisories
rhsa
idRHSA-2005:232
rpms
  • ipsec-tools-0:0.2.5-0.7
  • ipsec-tools-0:0.3.3-6
  • ipsec-tools-debuginfo-0:0.2.5-0.7
  • ipsec-tools-debuginfo-0:0.3.3-6