Vulnerabilities > CVE-2009-1574 - Unspecified vulnerability in Ipsec-Tools
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference.
Vulnerable Configurations
Exploit-Db
description | ipsec-tools racoon frag-isakmp Denial of Service PoC. CVE-2009-1574. Dos exploits for multiple platform |
id | EDB-ID:8669 |
last seen | 2016-02-01 |
modified | 2009-05-13 |
published | 2009-05-13 |
reporter | mu-b |
source | https://www.exploit-db.com/download/8669/ |
title | ipsec-tools racoon frag-isakmp Denial of Service PoC |
Nessus
NASL family MacOS X Local Security Checks NASL id MACOSX_SECUPD2009-006.NASL description The remote host is running a version of Mac OS X 10.5 that does not have Security Update 2009-006 applied. This security update contains fixes for the following products : - AFP Client - Adaptive Firewall - Apache - Apache Portable Runtime - ATS - Certificate Assistant - CoreGraphics - CUPS - Dictionary - DirectoryService - Disk Images - Event Monitor - fetchmail - FTP Server - Help Viewer - International Components for Unicode - IOKit - IPSec - libsecurity - libxml - OpenLDAP - OpenSSH - PHP - QuickDraw Manager - QuickLook - FreeRADIUS - Screen Sharing - Spotlight - Subversion last seen 2020-06-01 modified 2020-06-02 plugin id 42433 published 2009-11-09 reporter This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/42433 title Mac OS X Multiple Vulnerabilities (Security Update 2009-006) code # # (C) Tenable Network Security, Inc. # if (!defined_func("bn_random")) exit(0); if (NASL_LEVEL < 3000) exit(0); include("compat.inc"); if (description) { script_id(42433); script_version("1.27"); script_cve_id( "CVE-2007-5707", "CVE-2007-6698", "CVE-2008-0658", "CVE-2008-5161", "CVE-2009-0023", "CVE-2009-1191", "CVE-2009-1195", "CVE-2009-1574", "CVE-2009-1632", "CVE-2009-1890", "CVE-2009-1891", "CVE-2009-1955", "CVE-2009-1956", "CVE-2009-2408", "CVE-2009-2409", "CVE-2009-2411", "CVE-2009-2412", "CVE-2009-2414", "CVE-2009-2416", "CVE-2009-2666", "CVE-2009-2808", "CVE-2009-2818", "CVE-2009-2819", "CVE-2009-2820", "CVE-2009-2823", "CVE-2009-2824", "CVE-2009-2825", "CVE-2009-2826", "CVE-2009-2827", "CVE-2009-2828", "CVE-2009-2829", "CVE-2009-2831", "CVE-2009-2832", "CVE-2009-2833", "CVE-2009-2834", "CVE-2009-2837", "CVE-2009-2838", "CVE-2009-2839", "CVE-2009-2840", "CVE-2009-3111", "CVE-2009-3291", "CVE-2009-3292", "CVE-2009-3293" ); script_bugtraq_id( 26245, 27778, 34663, 35115, 35221, 35251, 35565, 35623, 35888, 35983, 36263, 36449, 36959, 36961, 36962, 36963, 36964, 36966, 36967, 36972, 36973, 36975, 36977, 36978, 36979, 36982, 36985, 36988, 36990 ); script_name(english:"Mac OS X Multiple Vulnerabilities (Security Update 2009-006)"); script_summary(english:"Check for the presence of Security Update 2009-006"); script_set_attribute( attribute:"synopsis", value: "The remote host is missing a Mac OS X update that fixes various security issues." ); script_set_attribute( attribute:"description", value: "The remote host is running a version of Mac OS X 10.5 that does not have Security Update 2009-006 applied. This security update contains fixes for the following products : - AFP Client - Adaptive Firewall - Apache - Apache Portable Runtime - ATS - Certificate Assistant - CoreGraphics - CUPS - Dictionary - DirectoryService - Disk Images - Event Monitor - fetchmail - FTP Server - Help Viewer - International Components for Unicode - IOKit - IPSec - libsecurity - libxml - OpenLDAP - OpenSSH - PHP - QuickDraw Manager - QuickLook - FreeRADIUS - Screen Sharing - Spotlight - Subversion" ); script_set_attribute( attribute:"see_also", value:"http://support.apple.com/kb/HT3937" ); script_set_attribute( attribute:"see_also", value:"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" ); script_set_attribute( attribute:"see_also", value:"http://www.securityfocus.com/advisories/18255" ); script_set_attribute( attribute:"solution", value:"Install Security Update 2009-006 or later." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_cwe_id(16, 20, 79, 119, 189, 200, 255, 264, 310, 399); script_set_attribute(attribute:"vuln_publication_date", value:"2009/11/09"); script_set_attribute(attribute:"patch_publication_date", value:"2009/11/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/11/09"); script_cvs_date("Date: 2018/07/16 12:48:31"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"MacOS X Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc."); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/MacOSX/packages", "Host/uname"); exit(0); } uname = get_kb_item("Host/uname"); if (!uname) exit(1, "The 'Host/uname' KB item is missing."); pat = "^.+Darwin.* ([0-9]+\.[0-9.]+).*$"; if (!ereg(pattern:pat, string:uname)) exit(1, "Can't identify the Darwin kernel version from the uname output ("+uname+")."); darwin = ereg_replace(pattern:pat, replace:"\1", string:uname); if (ereg(pattern:"^(9\.[0-8]\.)", string:darwin)) { packages = get_kb_item("Host/MacOSX/packages/boms"); if (!packages) exit(1, "The 'Host/MacOSX/packages/boms' KB item is missing."); if (egrep(pattern:"^com\.apple\.pkg\.update\.security\.(2009\.00[6-9]|20[1-9][0-9]\.[0-9]+)\.bom", string:packages)) exit(0, "The host has Security Update 2009-006 or later installed and therefore is not affected."); else security_hole(0); } else exit(0, "The host is running Darwin kernel version "+darwin+" and therefore is not affected.");
NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2009-112.NASL description racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference (CVE-2009-1574). Updated packages are available that brings ipsec-tools to version 0.7.2 for Mandriva Linux 2008.1/2009.0/2009.1 which provides numerous bugfixes over the previous 0.7.1 version, and also corrects this issue. ipsec-tools for Mandriva Linux Corporate Server 4 has been patched to address this issue. Additionally the flex package required for building ipsec-tools has been fixed due to ipsec-tools build problems and is also available with this update. Update : Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers last seen 2020-06-01 modified 2020-06-02 plugin id 38767 published 2009-05-14 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/38767 title Mandriva Linux Security Advisory : ipsec-tools (MDVSA-2009:112-1) NASL family SuSE Local Security Checks NASL id SUSE_11_1_NOVELL-IPSEC-TOOLS-090616.NASL description This update of ipsec-tools fixes a crash of racoon in ISAKMP last seen 2020-06-01 modified 2020-06-02 plugin id 40283 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/40283 title openSUSE Security Update : novell-ipsec-tools (novell-ipsec-tools-1007) NASL family Fedora Local Security Checks NASL id FEDORA_2009-4298.NASL description Minor version update from upstream fixing remote DoS. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 38810 published 2009-05-19 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/38810 title Fedora 10 : ipsec-tools-0.7.2-1.fc10 (2009-4298) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200905-03.NASL description The remote host is affected by the vulnerability described in GLSA-200905-03 (IPSec Tools: Denial of Service) The following vulnerabilities have been found in the racoon daemon as shipped with IPSec Tools: Neil Kettle reported that racoon/isakmp_frag.c is prone to a NULL pointer dereference (CVE-2009-1574). Multiple memory leaks exist in (1) the eay_check_x509sign() function in racoon/crypto_openssl.c and (2) racoon/nattraversal.c (CVE-2009-1632). Impact : A remote attacker could send specially crafted fragmented ISAKMP packets without a payload or exploit vectors related to X.509 certificate authentication and NAT traversal, possibly resulting in a crash of the racoon daemon. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 38884 published 2009-05-26 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/38884 title GLSA-200905-03 : IPSec Tools: Denial of Service NASL family Fedora Local Security Checks NASL id FEDORA_2009-4291.NASL description Minor version update from upstream fixing remote DoS. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 38809 published 2009-05-19 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/38809 title Fedora 9 : ipsec-tools-0.7.2-1.fc9 (2009-4291) NASL family Misc. NASL id AIRPORT_FIRMWARE_7_5_2.NASL description According to the firmware version collected via SNMP, the remote Apple Time Capsule / AirPort Base Station / AirPort Extreme Base Station is affected by multiple remote vulnerabilities. - An integer overflow exists in the last seen 2020-06-01 modified 2020-06-02 plugin id 51342 published 2010-12-17 reporter This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/51342 title Apple Time Capsule and AirPort Base Station Firmware < 7.5.2 (APPLE-SA-2010-12-16-1) NASL family SuSE Local Security Checks NASL id SUSE_11_NOVELL-IPSEC-TOOLS-090616.NASL description This update of ipsec-tools fixes a crash of racoon in ISAKMP last seen 2020-06-01 modified 2020-06-02 plugin id 41440 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41440 title SuSE 11 Security Update : Novell ipsec tools (SAT Patch Number 1006) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1804.NASL description Several remote vulnerabilities have been discovered in racoon, the Internet Key Exchange daemon of ipsec-tools. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2009-1574 Neil Kettle discovered a NULL pointer dereference on crafted fragmented packets that contain no payload. This results in the daemon crashing which can be used for denial of service attacks. - CVE-2009-1632 Various memory leaks in the X.509 certificate authentication handling and the NAT-Traversal keepalive implementation can result in memory exhaustion and thus denial of service. last seen 2020-06-01 modified 2020-06-02 plugin id 38861 published 2009-05-22 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/38861 title Debian DSA-1804-1 : ipsec-tools - NULL pointer dereference, memory leaks NASL family SuSE Local Security Checks NASL id SUSE_11_0_IPSEC-TOOLS-090613.NASL description This update of ipsec-tools fixes a crash of racoon in ISAKMP last seen 2020-06-01 modified 2020-06-02 plugin id 39993 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/39993 title openSUSE Security Update : ipsec-tools (ipsec-tools-996) NASL family OracleVM Local Security Checks NASL id ORACLEVM_OVMSA-2009-0010.NASL description The remote OracleVM system is missing necessary patches to address critical security updates : CVE-2009-1574 racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference. CVE-2009-1632 Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication with X.509 certificates, related to the eay_check_x509sign function in src/racoon/crypto_openssl.c and (2) the NAT-Traversal (aka NAT-T) keepalive implementation, related to src/racoon/nattraversal.c. CVE-2008-3651 Memory leak in racoon/proposal.c in the racoon daemon in ipsec-tools before 0.7.1 allows remote authenticated users to cause a denial of service (memory consumption) via invalid proposals. CVE-2008-3652 src/racoon/handler.c in racoon in ipsec-tools does not remove an last seen 2020-06-01 modified 2020-06-02 plugin id 79457 published 2014-11-26 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/79457 title OracleVM 2.1 : ipsec-tools (OVMSA-2009-0010) NASL family Fedora Local Security Checks NASL id FEDORA_2009-4394.NASL description Minor version update from upstream fixing remote DoS. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 38811 published 2009-05-19 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/38811 title Fedora 11 : ipsec-tools-0.7.2-1.fc11 (2009-4394) NASL family SuSE Local Security Checks NASL id SUSE_11_1_IPSEC-TOOLS-090613.NASL description This update of ipsec-tools fixes a crash of racoon in ISAKMP last seen 2020-06-01 modified 2020-06-02 plugin id 40233 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/40233 title openSUSE Security Update : ipsec-tools (ipsec-tools-996) NASL family MacOS X Local Security Checks NASL id MACOSX_10_6_2.NASL description The remote host is running a version of Mac OS X 10.6.x that is prior to 10.6.2. Mac OS X 10.6.2 contains security fixes for the following products : - Adaptive Firewall - Apache - Apache Portable Runtime - Certificate Assistant - CoreMedia - CUPS - Dovecot - fetchmail - file - FTP Server - Help Viewer - ImageIO - IOKit - IPSec - Kernel - Launch Services - libsecurity - libxml - Login Window - OpenLDAP - QuickDraw Manager - QuickTime - Screen Sharing - Subversion last seen 2020-06-01 modified 2020-06-02 plugin id 42434 published 2009-11-09 reporter This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/42434 title Mac OS X 10.6.x < 10.6.2 Multiple Vulnerabilities NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2009-1036.NASL description An updated ipsec-tools package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The ipsec-tools package is used in conjunction with the IPsec functionality in the Linux kernel and includes racoon, an IKEv1 keying daemon. A denial of service flaw was found in the ipsec-tools racoon daemon. An unauthenticated, remote attacker could trigger a NULL pointer dereference that could cause the racoon daemon to crash. (CVE-2009-1574) Multiple memory leak flaws were found in the ipsec-tools racoon daemon. If a remote attacker is able to make multiple connection attempts to the racoon daemon, it was possible to cause the racoon daemon to consume all available memory. (CVE-2009-1632) Users of ipsec-tools should upgrade to this updated package, which contains backported patches to correct these issues. Users must restart the racoon daemon for this update to take effect. last seen 2020-06-01 modified 2020-06-02 plugin id 38819 published 2009-05-19 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/38819 title RHEL 5 : ipsec-tools (RHSA-2009:1036) NASL family SuSE Local Security Checks NASL id SUSE_11_IPSEC-TOOLS-090613.NASL description This update of ipsec-tools fixes a crash of racoon in ISAKMP last seen 2020-06-01 modified 2020-06-02 plugin id 41403 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41403 title SuSE 11 Security Update : ipsec-tools (SAT Patch Number 998) NASL family Scientific Linux Local Security Checks NASL id SL_20090518_IPSEC_TOOLS_ON_SL5_X.NASL description A denial of service flaw was found in the ipsec-tools racoon daemon. An unauthenticated, remote attacker could trigger a NULL pointer dereference that could cause the racoon daemon to crash. (CVE-2009-1574) Multiple memory leak flaws were found in the ipsec-tools racoon daemon. If a remote attacker is able to make multiple connection attempts to the racoon daemon, it was possible to cause the racoon daemon to consume all available memory. (CVE-2009-1632) Users must restart the racoon daemon for this update to take effect. last seen 2020-06-01 modified 2020-06-02 plugin id 60585 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60585 title Scientific Linux Security Update : ipsec-tools on SL5.x i386/x86_64 NASL family SuSE Local Security Checks NASL id SUSE_NOVELL-IPSEC-TOOLS-6306.NASL description This update of ipsec-tools fixes a crash of racoon in ISAKMP last seen 2020-06-01 modified 2020-06-02 plugin id 51759 published 2011-01-27 reporter This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/51759 title SuSE 10 Security Update : Novell ipsec tools (ZYPP Patch Number 6306) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-785-1.NASL description It was discovered that ipsec-tools did not properly handle certain fragmented packets. A remote attacker could send specially crafted packets to the server and cause a denial of service. (CVE-2009-1574) It was discovered that ipsec-tools did not properly handle memory usage when verifying certificate signatures or processing nat-traversal keep-alive messages. A remote attacker could send specially crafted packets to the server and exhaust available memory, leading to a denial of service. (CVE-2009-1632). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 39353 published 2009-06-10 reporter Ubuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/39353 title Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : ipsec-tools vulnerabilities (USN-785-1) NASL family SuSE Local Security Checks NASL id SUSE_11_0_NOVELL-IPSEC-TOOLS-090616.NASL description This update of ipsec-tools fixes a crash of racoon in ISAKMP last seen 2020-06-01 modified 2020-06-02 plugin id 40081 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/40081 title openSUSE Security Update : novell-ipsec-tools (novell-ipsec-tools-1007) NASL family SuSE Local Security Checks NASL id SUSE_NOVELL-IPSEC-TOOLS-6307.NASL description This update of ipsec-tools fixes a crash of racoon in ISAKMP last seen 2020-06-01 modified 2020-06-02 plugin id 42025 published 2009-10-06 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/42025 title openSUSE 10 Security Update : novell-ipsec-tools (novell-ipsec-tools-6307) NASL family SuSE Local Security Checks NASL id SUSE_IPSEC-TOOLS-6302.NASL description This update of ipsec-tools fixes a crash of racoon in ISAKMP last seen 2020-06-01 modified 2020-06-02 plugin id 39514 published 2009-06-25 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/39514 title openSUSE 10 Security Update : ipsec-tools (ipsec-tools-6302) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2009-1036.NASL description From Red Hat Security Advisory 2009:1036 : An updated ipsec-tools package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The ipsec-tools package is used in conjunction with the IPsec functionality in the Linux kernel and includes racoon, an IKEv1 keying daemon. A denial of service flaw was found in the ipsec-tools racoon daemon. An unauthenticated, remote attacker could trigger a NULL pointer dereference that could cause the racoon daemon to crash. (CVE-2009-1574) Multiple memory leak flaws were found in the ipsec-tools racoon daemon. If a remote attacker is able to make multiple connection attempts to the racoon daemon, it was possible to cause the racoon daemon to consume all available memory. (CVE-2009-1632) Users of ipsec-tools should upgrade to this updated package, which contains backported patches to correct these issues. Users must restart the racoon daemon for this update to take effect. last seen 2020-06-01 modified 2020-06-02 plugin id 67859 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67859 title Oracle Linux 5 : ipsec-tools (ELSA-2009-1036) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2009-1036.NASL description An updated ipsec-tools package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The ipsec-tools package is used in conjunction with the IPsec functionality in the Linux kernel and includes racoon, an IKEv1 keying daemon. A denial of service flaw was found in the ipsec-tools racoon daemon. An unauthenticated, remote attacker could trigger a NULL pointer dereference that could cause the racoon daemon to crash. (CVE-2009-1574) Multiple memory leak flaws were found in the ipsec-tools racoon daemon. If a remote attacker is able to make multiple connection attempts to the racoon daemon, it was possible to cause the racoon daemon to consume all available memory. (CVE-2009-1632) Users of ipsec-tools should upgrade to this updated package, which contains backported patches to correct these issues. Users must restart the racoon daemon for this update to take effect. last seen 2020-06-01 modified 2020-06-02 plugin id 43749 published 2010-01-06 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/43749 title CentOS 5 : ipsec-tools (CESA-2009:1036) NASL family SuSE Local Security Checks NASL id SUSE_IPSEC-TOOLS-6301.NASL description This update of ipsec-tools fixes a crash of racoon in ISAKMP last seen 2020-06-01 modified 2020-06-02 plugin id 41523 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41523 title SuSE 10 Security Update : ipsec-tools (ZYPP Patch Number 6301)
Oval
accepted | 2013-04-29T04:20:47.430-04:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
definition_extensions |
| ||||||||||||
description | racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference. | ||||||||||||
family | unix | ||||||||||||
id | oval:org.mitre.oval:def:9624 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||
title | racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference. | ||||||||||||
version | 18 |
Redhat
advisories |
| ||||
rpms |
|
References
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
- http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
- http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html
- http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
- http://secunia.com/advisories/35113
- http://secunia.com/advisories/35113
- http://secunia.com/advisories/35153
- http://secunia.com/advisories/35153
- http://secunia.com/advisories/35159
- http://secunia.com/advisories/35159
- http://secunia.com/advisories/35212
- http://secunia.com/advisories/35212
- http://secunia.com/advisories/35404
- http://secunia.com/advisories/35404
- http://secunia.com/advisories/35685
- http://secunia.com/advisories/35685
- http://security.gentoo.org/glsa/glsa-200905-03.xml
- http://security.gentoo.org/glsa/glsa-200905-03.xml
- http://sourceforge.net/project/shownotes.php?group_id=74601&release_id=677611
- http://sourceforge.net/project/shownotes.php?group_id=74601&release_id=677611
- http://support.apple.com/kb/HT3937
- http://support.apple.com/kb/HT3937
- http://support.apple.com/kb/HT4298
- http://support.apple.com/kb/HT4298
- http://www.debian.org/security/2009/dsa-1804
- http://www.debian.org/security/2009/dsa-1804
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:112
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:112
- http://www.openwall.com/lists/oss-security/2009/04/29/6
- http://www.openwall.com/lists/oss-security/2009/04/29/6
- http://www.openwall.com/lists/oss-security/2009/05/04/3
- http://www.openwall.com/lists/oss-security/2009/05/04/3
- http://www.redhat.com/support/errata/RHSA-2009-1036.html
- http://www.redhat.com/support/errata/RHSA-2009-1036.html
- http://www.securityfocus.com/bid/34765
- http://www.securityfocus.com/bid/34765
- http://www.ubuntu.com/usn/USN-785-1
- http://www.ubuntu.com/usn/USN-785-1
- http://www.vupen.com/english/advisories/2009/3184
- http://www.vupen.com/english/advisories/2009/3184
- https://bugzilla.redhat.com/show_bug.cgi?id=497990
- https://bugzilla.redhat.com/show_bug.cgi?id=497990
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50412
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50412
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9624
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9624
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00725.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00725.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00746.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00746.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00789.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00789.html