From 2202c041a0ac2b5509141be37cb84f416b4f48a2 Mon Sep 17 00:00:00 2001 From: nectar Date: Fri, 3 Jun 2005 19:08:21 +0000 Subject: Document a remote denial-of-service vulnerability in racoon. --- security/vuxml/vuln.xml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index cfaadcd82b1c..723324807d27 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,33 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + racoon -- remote denial-of-service + + + racoon + 20050510a + + + + +

Sebastian Krahmer discovered that the racoon ISAKMP daemon + could be crashed with a maliciously crafted UDP packet. No + authentication is required in order to perform the attack.

+ +
+ + CAN-2005-0398 + http://sourceforge.net/mailarchive/forum.php?thread_id=6787713&forum_id=32000 + http://xforce.iss.net/xforce/xfdb/19707 + https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=109966&action=view + + + 2005-03-12 + 2005-06-03 + +
+ xli -- integer overflows in image size calculations -- cgit