Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kame kame vulnerabilities and exploits
(subscribe to this query)
7.1
CVSSv2
CVE-2008-2464
The mld_input function in sys/netinet6/mld6.c in the kernel in NetBSD 4.0, FreeBSD, and KAME, when INET6 is enabled, allows remote malicious users to cause a denial of service (divide-by-zero error and panic) via a malformed ICMPv6 Multicast Listener Discovery (MLD) query with a ...
Netbsd Netbsd 4.0
Freebsd Freebsd
Kame Kame
5
CVSSv2
CVE-2005-0398
The KAME racoon daemon in ipsec-tools prior to 0.5 allows remote malicious users to cause a denial of service (crash) via malformed ISAKMP packets.
Kame Racoon 2005-01-10
Kame Racoon 2005-01-17
Kame Racoon 2005-03-07
Sgi Propack 3.0
Kame Racoon 2004-04-05
Kame Racoon 2004-04-07b
Kame Racoon 2005-02-07
Kame Racoon 2005-02-14
Ipsec-tools Ipsec-tools 0.3.3
Ipsec-tools Ipsec-tools 0.5
Kame Racoon 2003-07-11
Kame Racoon 2005-01-24
Kame Racoon 2005-01-31
Kame Racoon 2004-05-03
Kame Racoon 2005-01-03
Kame Racoon 2005-02-21
Kame Racoon 2005-02-28
Redhat Enterprise Linux 4.0
Suse Suse Linux 9.2
Altlinux Alt Linux 2.3
Redhat Enterprise Linux 3.0
Suse Suse Linux
7.8
CVSSv2
CVE-2008-0177
The ipcomp6_input function in sys/netinet6/ipcomp_input.c in the KAME project prior to 20071201 does not properly check the return value of the m_pulldown function, which allows remote malicious users to cause a denial of service (system crash) via an IPv6 packet with an IPComp h...
Kame Ipcomp
1 EDB exploit
5
CVSSv2
CVE-2004-0392
racoon prior to 20040407b allows remote malicious users to cause a denial of service (infinite loop and dropped connections) via an IKE message with a malformed Generic Payload Header containing invalid (1) "Security Association Next Payload" and (2) "RESERVED"...
Kame Racoon
5
CVSSv2
CVE-2004-0403
Racoon prior to 20040408a allows remote malicious users to cause a denial of service (memory consumption) via an ISAKMP packet with a large length field.
Kame Racoon
7.5
CVSSv2
CVE-2004-0155
The KAME IKE Daemon Racoon, when authenticating a peer during Phase 1, validates the X.509 certificate but does not verify the RSA signature authentication, which allows remote malicious users to establish unauthorized IP connections or conduct man-in-the-middle attacks using a v...
Kame Racoon
5
CVSSv2
CVE-2004-0164
KAME IKE daemon (racoon) does not properly handle hash values, which allows remote malicious users to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handl...
Kame Racoon All Versions
1 EDB exploit
10
CVSSv2
CVE-2004-0607
The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote malicious users to bypass authentication.
Ipsec-tools Ipsec-tools 0.3
Ipsec-tools Ipsec-tools 0.3.1
Kame Racoon
Kame Racoon 2003-07-11
Ipsec-tools Ipsec-tools 0.3.2
Ipsec-tools Ipsec-tools 0.3 Rc1
Kame Racoon 2004-04-05
Kame Racoon 2004-04-07b
Ipsec-tools Ipsec-tools 0.3 Rc2
Ipsec-tools Ipsec-tools 0.3 Rc3
Kame Racoon 2004-05-03
Ipsec-tools Ipsec-tools 0.3 Rc4
Ipsec-tools Ipsec-tools 0.3 Rc5
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
NA
CVE-2024-30727
An issue exists in ROS Kinetic Kame in Kinetic Kame ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, where the system transmits messages in plaintext, allowing malicious users to obtain sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties...
1 Github repository
2.1
CVSSv2
CVE-2004-0370
The setsockopt call in the KAME Project IPv6 implementation, as used in FreeBSD 5.2, does not properly handle certain IPv6 socket options, which could allow malicious users to read kernel memory and cause a system panic.
Freebsd Freebsd 5.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »