7.5
CVSSv3

CVE-2016-10396

Published: 06/07/2017 Updated: 27/07/2017
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote malicious user to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ipsec-tools ipsec-tools 0.8.2

Vendor Advisories

Debian Bug report logs - #867986 CVE-2016-10396 Package: racoon; Maintainer for racoon is ipsec-tools packagers <team+ipsec-tools@trackerdebianorg>; Source for racoon is src:ipsec-tools (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Mon, 10 Jul 2017 21:21:02 UTC Severity: grave Tags: ...
ipsec-tools could be made to crash if it received specially crafted network traffic ...
The racoon daemon in IPsec-Tools 082 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computat ...
The racoon daemon in IPsec-Tools 082 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computat ...