Ipsec-tools

Ipsec-tools

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.08%
  • Veröffentlicht 06.07.2017 01:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint b...

Exploit
  • EPSS 2.67%
  • Veröffentlicht 29.05.2015 15:59:19
  • Zuletzt bearbeitet 06.05.2026 22:30:45

racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests.

  • EPSS 4.7%
  • Veröffentlicht 14.05.2009 17:30:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication with X.509 certificates, related to the eay_check_x...

Exploit
  • EPSS 15.73%
  • Veröffentlicht 06.05.2009 17:30:09
  • Zuletzt bearbeitet 23.04.2026 00:35:47

racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference.

  • EPSS 19.69%
  • Veröffentlicht 13.08.2008 01:41:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

src/racoon/handler.c in racoon in ipsec-tools does not remove an "orphaned ph1" (phase 1) handle when it has been initiated remotely, which allows remote attackers to cause a denial of service (resource consumption).

  • EPSS 9.81%
  • Veröffentlicht 10.04.2007 22:19:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The isakmp_info_recv function in src/racoon/isakmp_inf.c in racoon in Ipsec-tools before 0.6.7 allows remote attackers to cause a denial of service (tunnel crash) via crafted (1) DELETE (ISAKMP_NPTYPE_D) and (2) NOTIFY (ISAKMP_NPTYPE_N) messages.

  • EPSS 16.17%
  • Veröffentlicht 21.11.2005 22:03:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The Internet Key Exchange version 1 (IKEv1) implementation (isakmp_agg.c) in racoon in ipsec-tools before 0.6.3, when running in aggressive mode, allows remote attackers to cause a denial of service (null dereference and crash) via crafted IKE packet...

  • EPSS 4.06%
  • Veröffentlicht 14.03.2005 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets.

  • EPSS 3.01%
  • Veröffentlicht 06.12.2004 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote attackers to bypass authentication.