Vulnerability Name: | CVE-2004-0164 (CCN-14117) | ||||||||||||||||
Assigned: | 2003-12-31 | ||||||||||||||||
Published: | 2003-12-31 | ||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||
Summary: | KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c. | ||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: NETBSD Type: UNKNOWN NetBSD-SA2004-001 Source: CCN Type: BugTraq Mailing List, Thu Jan 01 2004 - 14:20:18 CST Re: multiple payload handling flaws in isakmpd, again Source: CCN Type: BugTraq Mailing List, Wed Dec 31 2003 - 16:38:58 CST multiple payload handling flaws in isakmpd, again Source: CCN Type: BugTraq Mailing List, Tue Jan 13 2004 - 15:39:40 CST unauthorized deletion of IPsec (and ISAKMP) SAs in racoon Source: MITRE Type: CNA CVE-2004-0164 Source: APPLE Type: UNKNOWN APPLE-SA-2004-02-23 Source: BUGTRAQ Type: UNKNOWN 20040113 unauthorized deletion of IPsec (and ISAKMP) SAs in racoon Source: BUGTRAQ Type: UNKNOWN 20040114 Re: unauthorized deletion of IPsec (and ISAKMP) SAs in racoon Source: CCN Type: RHSA-2004-165 ipsec-tools security update Source: CCN Type: BID-9333 ISAKMPD "Invalid SPI" SA Deletion Vulnerability Source: BID Type: UNKNOWN 9416 Source: CCN Type: BID-9416 KAME Racoon "Authentication" SA Deletion Vulnerability Source: BID Type: UNKNOWN 9417 Source: CCN Type: BID-9417 KAME Racoon "Initial Contact" SA Deletion Vulnerability Source: CCN Type: BID-9731 Multiple Apple Mac OS X Local And Remote Vulnerabilities Source: XF Type: UNKNOWN openbsd-isakmp-invalidspi-delete-sa(14117) Source: XF Type: UNKNOWN openbsd-isakmp-invalidspi-delete-sa(14117) Source: XF Type: UNKNOWN openbsd-isakmp-initialcontact-delete-sa(14118) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:947 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9737 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||
Vulnerability Name: | CVE-2004-0164 (CCN-14118) | ||||||||||||||||
Assigned: | 2003-12-31 | ||||||||||||||||
Published: | 2003-12-31 | ||||||||||||||||
Updated: | 2003-12-31 | ||||||||||||||||
Summary: | KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c. | ||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: CCN Type: BugTraq Mailing List, Thu Jan 01 2004 - 14:20:18 CST Re: multiple payload handling flaws in isakmpd, again Source: CCN Type: BugTraq Mailing List, Wed Dec 31 2003 - 16:38:58 CST multiple payload handling flaws in isakmpd, again Source: CCN Type: BugTraq Mailing List, Tue Jan 13 2004 - 15:39:40 CST unauthorized deletion of IPsec (and ISAKMP) SAs in racoon Source: MITRE Type: CNA CVE-2004-0164 Source: CCN Type: NetBSD Security Advisory 2004-001 Insufficient packet validation in racoon IKE daemon Source: CCN Type: RHSA-2004-165 ipsec-tools security update Source: CCN Type: BID-10496 OpenBSD ISAKMPD Security Association Piggyback Delete Payload Denial Of Service Vulnerability Source: CCN Type: BID-9334 ISAKMPD "Initial Contact" Notification SA Deletion Vulnerability Source: CCN Type: BID-9416 KAME Racoon "Authentication" SA Deletion Vulnerability Source: CCN Type: BID-9417 KAME Racoon "Initial Contact" SA Deletion Vulnerability Source: CCN Type: BID-9436 OpenBSD 3.4 Crypto Card Handlers File Descriptor Leak Vulnerability Source: XF Type: UNKNOWN openbsd-isakmp-initialcontact-delete-sa(14118) | ||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |