Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2008-3651

Disclosure Date: August 13, 2008 (last updated October 04, 2023)
Memory leak in racoon/proposal.c in the racoon daemon in ipsec-tools before 0.7.1 allows remote authenticated users to cause a denial of service (memory consumption) via invalid proposals.
0
Attacker Value
Unknown

CVE-2005-0398

Disclosure Date: March 14, 2005 (last updated February 22, 2025)
The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets.
0
Attacker Value
Unknown

CVE-2004-0607

Disclosure Date: December 06, 2004 (last updated February 22, 2025)
The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote attackers to bypass authentication.
0
Attacker Value
Unknown

CVE-2004-0392

Disclosure Date: June 14, 2004 (last updated February 22, 2025)
racoon before 20040407b allows remote attackers to cause a denial of service (infinite loop and dropped connections) via an IKE message with a malformed Generic Payload Header containing invalid (1) "Security Association Next Payload" and (2) "RESERVED" fields.
0
Attacker Value
Unknown

CVE-2004-0403

Disclosure Date: June 01, 2004 (last updated February 22, 2025)
Racoon before 20040408a allows remote attackers to cause a denial of service (memory consumption) via an ISAKMP packet with a large length field.
0
Attacker Value
Unknown

CVE-2004-0155

Disclosure Date: June 01, 2004 (last updated February 22, 2025)
The KAME IKE Daemon Racoon, when authenticating a peer during Phase 1, validates the X.509 certificate but does not verify the RSA signature authentication, which allows remote attackers to establish unauthorized IP connections or conduct man-in-the-middle attacks using a valid, trusted X.509 certificate.
0
Attacker Value
Unknown

CVE-2004-0164

Disclosure Date: March 03, 2004 (last updated February 22, 2025)
KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c.
0