5
CVSSv2

CVE-2009-1574

Published: 06/05/2009 Updated: 29/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

racoon/isakmp_frag.c in ipsec-tools prior to 0.7.2 allows remote malicious users to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference.

Vulnerable Product Search on Vulmon Subscribe to Product

ipsec-tools ipsec-tools 0.1

ipsec-tools ipsec-tools 0.2

ipsec-tools ipsec-tools 0.3.1

ipsec-tools ipsec-tools 0.4

ipsec-tools ipsec-tools 0.6.5

ipsec-tools ipsec-tools 0.6.6

ipsec-tools ipsec-tools 0.3

ipsec-tools ipsec-tools 0.2.3

ipsec-tools ipsec-tools 0.2.4

ipsec-tools ipsec-tools 0.6.1

ipsec-tools ipsec-tools 0.6.2

ipsec-tools ipsec-tools 0.3.3

ipsec-tools ipsec-tools 0.3.2

ipsec-tools ipsec-tools 0.6.3

ipsec-tools ipsec-tools 0.6.4

ipsec-tools ipsec-tools 0.2.1

ipsec-tools ipsec-tools 0.2.2

ipsec-tools ipsec-tools 0.5

ipsec-tools ipsec-tools 0.7

ipsec-tools ipsec-tools

Vendor Advisories

Synopsis Important: ipsec-tools security update Type/Severity Security Advisory: Important Topic An updated ipsec-tools package that fixes multiple security issues is nowavailable for Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Security Response Te ...
Debian Bug report logs - #527634 ipsec-tools: CVE-2009-1574 remote denial of service Package: ipsec-tools; Maintainer for ipsec-tools is ipsec-tools packagers <team+ipsec-tools@trackerdebianorg>; Source for ipsec-tools is src:ipsec-tools (PTS, buildd, popcon) Reported by: Luciano Bello <luciano@debianorg> Date: Fr ...
It was discovered that ipsec-tools did not properly handle certain fragmented packets A remote attacker could send specially crafted packets to the server and cause a denial of service (CVE-2009-1574) ...
Several remote vulnerabilities have been discovered in racoon, the Internet Key Exchange daemon of ipsec-tools The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-1574 Neil Kettle discovered a NULL pointer dereference on crafted fragmented packets that contain no payload This results in the daemon crashin ...

Exploits

/* racoon-isakmp-dosc * * Copyright (c) 2009 by <mu-b@digit-labsorg> * * ipsec-tools racoon frag-isakmp DoS POC * by mu-b - Thu Apr 02 2009 * * - Tested on: ipsec-tools-071 * * - Private Source Code -DO NOT DISTRIBUTE - * wwwdigit-labsorg/ -- Digit-Labs 2009!@$! */ #include <stdioh> #include <stdlibh> ...

References

NVD-CWE-Otherhttp://www.openwall.com/lists/oss-security/2009/04/29/6http://sourceforge.net/project/shownotes.php?group_id=74601&release_id=677611https://bugzilla.redhat.com/show_bug.cgi?id=497990http://www.openwall.com/lists/oss-security/2009/05/04/3http://www.mandriva.com/security/advisories?name=MDVSA-2009:112https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00725.htmlhttp://www.debian.org/security/2009/dsa-1804https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00746.htmlhttp://secunia.com/advisories/35113http://www.redhat.com/support/errata/RHSA-2009-1036.htmlhttp://secunia.com/advisories/35159http://secunia.com/advisories/35153http://secunia.com/advisories/35212http://security.gentoo.org/glsa/glsa-200905-03.xmlhttp://www.ubuntu.com/usn/USN-785-1https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00789.htmlhttp://www.securityfocus.com/bid/34765http://secunia.com/advisories/35404http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.htmlhttp://secunia.com/advisories/35685http://support.apple.com/kb/HT3937http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.htmlhttp://www.vupen.com/english/advisories/2009/3184http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.htmlhttp://support.apple.com/kb/HT4298http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705https://exchange.xforce.ibmcloud.com/vulnerabilities/50412https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9624https://access.redhat.com/errata/RHSA-2009:1036https://usn.ubuntu.com/785-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/8669/