Kame

Racoon

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.06%
  • Veröffentlicht 14.03.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets.

  • EPSS 3.04%
  • Veröffentlicht 06.12.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote attackers to bypass authentication.

  • EPSS 0.93%
  • Veröffentlicht 14.06.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

racoon before 20040407b allows remote attackers to cause a denial of service (infinite loop and dropped connections) via an IKE message with a malformed Generic Payload Header containing invalid (1) "Security Association Next Payload" and (2) "RESERV...

  • EPSS 4.94%
  • Veröffentlicht 01.06.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The KAME IKE Daemon Racoon, when authenticating a peer during Phase 1, validates the X.509 certificate but does not verify the RSA signature authentication, which allows remote attackers to establish unauthorized IP connections or conduct man-in-the-...

Exploit
  • EPSS 13.26%
  • Veröffentlicht 01.06.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Racoon before 20040408a allows remote attackers to cause a denial of service (memory consumption) via an ISAKMP packet with a large length field.

  • EPSS 12.69%
  • Veröffentlicht 03.03.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message th...