5
CVSSv2

CVE-2009-1632

Published: 14/05/2009 Updated: 29/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Multiple memory leaks in Ipsec-tools prior to 0.7.2 allow remote malicious users to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication with X.509 certificates, related to the eay_check_x509sign function in src/racoon/crypto_openssl.c; and (2) the NAT-Traversal (aka NAT-T) keepalive implementation, related to src/racoon/nattraversal.c.

Vulnerable Product Search on Vulmon Subscribe to Product

ipsec-tools ipsec-tools 0.1

ipsec-tools ipsec-tools 0.2

ipsec-tools ipsec-tools 0.3.2

ipsec-tools ipsec-tools 0.3

ipsec-tools ipsec-tools 0.3.3

ipsec-tools ipsec-tools 0.6.3

ipsec-tools ipsec-tools 0.3.1

ipsec-tools ipsec-tools 0.3_rc1

ipsec-tools ipsec-tools 0.5

ipsec-tools ipsec-tools 0.5.2

ipsec-tools ipsec-tools 0.6.4

ipsec-tools ipsec-tools 0.7

ipsec-tools ipsec-tools 0.2.3

ipsec-tools ipsec-tools 0.2.4

ipsec-tools ipsec-tools 0.3_rc3

ipsec-tools ipsec-tools 0.6

ipsec-tools ipsec-tools 0.6.2

ipsec-tools ipsec-tools 0.4

ipsec-tools ipsec-tools 0.6.7

ipsec-tools ipsec-tools 0.6.5

ipsec-tools ipsec-tools 0.6.6

ipsec-tools ipsec-tools

ipsec-tools ipsec-tools 0.2.1

ipsec-tools ipsec-tools 0.2.2

ipsec-tools ipsec-tools 0.3_rc2

ipsec-tools ipsec-tools 0.3_rc4

ipsec-tools ipsec-tools 0.6.1

ipsec-tools ipsec-tools 0.5.1

ipsec-tools ipsec-tools 0.3_rc5

Vendor Advisories

Synopsis Important: ipsec-tools security update Type/Severity Security Advisory: Important Topic An updated ipsec-tools package that fixes multiple security issues is nowavailable for Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Security Response Te ...
Debian Bug report logs - #528933 CVE-2009-1632: Multiple memory leaks in Ipsec-tools before 072 Package: ipsec-tools; Maintainer for ipsec-tools is ipsec-tools packagers <team+ipsec-tools@trackerdebianorg>; Source for ipsec-tools is src:ipsec-tools (PTS, buildd, popcon) Reported by: Giuseppe Iuculano <giuseppe@iuculan ...
It was discovered that ipsec-tools did not properly handle certain fragmented packets A remote attacker could send specially crafted packets to the server and cause a denial of service (CVE-2009-1574) ...
Several remote vulnerabilities have been discovered in racoon, the Internet Key Exchange daemon of ipsec-tools The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-1574 Neil Kettle discovered a NULL pointer dereference on crafted fragmented packets that contain no payload This results in the daemon crashin ...

References

CWE-399http://sourceforge.net/project/shownotes.php?group_id=74601&release_id=677611http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/crypto_openssl.c.diff?r1=1.11.6.4&r2=1.11.6.5&f=hhttp://marc.info/?l=oss-security&m=124101704828036&w=2https://trac.ipsec-tools.net/ticket/303http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/nattraversal.c.diff?r1=1.6&r2=1.6.6.1&f=hhttp://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/crypto_openssl.chttp://www.openwall.com/lists/oss-security/2009/05/12/3http://sourceforge.net/mailarchive/forum.php?thread_name=20090422151825.GB46988%40zeninc.net&forum_name=ipsec-tools-announcehttp://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/nattraversal.chttp://www.mandriva.com/security/advisories?name=MDVSA-2009:114http://www.debian.org/security/2009/dsa-1804http://www.redhat.com/support/errata/RHSA-2009-1036.htmlhttp://secunia.com/advisories/35159http://secunia.com/advisories/35153http://security.gentoo.org/glsa/glsa-200905-03.xmlhttp://secunia.com/advisories/35212http://www.ubuntu.com/usn/USN-785-1http://www.securityfocus.com/bid/34765http://secunia.com/advisories/35404http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.htmlhttp://secunia.com/advisories/35685http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.htmlhttp://support.apple.com/kb/HT3937http://www.vupen.com/english/advisories/2009/3184http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10581https://access.redhat.com/errata/RHSA-2009:1036https://usn.ubuntu.com/785-1/https://nvd.nist.gov