KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9737 | vdb entry signature |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A947 | vdb entry signature |
http://www.securityfocus.com/bid/9417 | vdb entry |
http://www.securityfocus.com/bid/9416 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/14117 | vdb entry |
http://marc.info/?l=bugtraq&m=107411758202662&w=2 | mailing list |
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-001.txt.asc | vendor advisory |
http://marc.info/?l=bugtraq&m=107403331309838&w=2 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/14118 | vdb entry |
http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html | vendor advisory |