Ipsec-tools

Ipsec-tools

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.79%
  • Veröffentlicht 06.07.2017 01:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint b...

Exploit
  • EPSS 3.59%
  • Veröffentlicht 29.05.2015 15:59:19
  • Zuletzt bearbeitet 12.04.2025 10:46:40

racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests.

  • EPSS 4.31%
  • Veröffentlicht 14.05.2009 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication with X.509 certificates, related to the eay_check_x...

Exploit
  • EPSS 6.23%
  • Veröffentlicht 06.05.2009 17:30:09
  • Zuletzt bearbeitet 09.04.2025 00:30:58

racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference.

  • EPSS 18.13%
  • Veröffentlicht 13.08.2008 01:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

src/racoon/handler.c in racoon in ipsec-tools does not remove an "orphaned ph1" (phase 1) handle when it has been initiated remotely, which allows remote attackers to cause a denial of service (resource consumption).

  • EPSS 7.57%
  • Veröffentlicht 10.04.2007 22:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The isakmp_info_recv function in src/racoon/isakmp_inf.c in racoon in Ipsec-tools before 0.6.7 allows remote attackers to cause a denial of service (tunnel crash) via crafted (1) DELETE (ISAKMP_NPTYPE_D) and (2) NOTIFY (ISAKMP_NPTYPE_N) messages.

  • EPSS 18.86%
  • Veröffentlicht 21.11.2005 22:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The Internet Key Exchange version 1 (IKEv1) implementation (isakmp_agg.c) in racoon in ipsec-tools before 0.6.3, when running in aggressive mode, allows remote attackers to cause a denial of service (null dereference and crash) via crafted IKE packet...

  • EPSS 4.06%
  • Veröffentlicht 14.03.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets.

  • EPSS 3.04%
  • Veröffentlicht 06.12.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote attackers to bypass authentication.