Vulnerability Name:

CVE-2004-0607 (CCN-16414)

Assigned:2004-06-14
Published:2004-06-14
Updated:2017-10-11
Summary:The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote attackers to bypass authentication.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: SCO Security Advisory
SCOSA-2005.10

Source: SCO
Type: UNKNOWN
SCOSA-2005.10

Source: CCN
Type: BugTraq Mailing List, Tue Jun 15 2004 - 10:17:25 CDT
Re: authentication bug in KAME's racoon

Source: CCN
Type: Full-Disclosure Mailing List, Mon Jun 14 2004 - 13:55:11 CDT
authentication bug in KAME's racoon

Source: MITRE
Type: CNA
CVE-2004-0607

Source: CCN
Type: Ipsec-Tools Web page
IPsec-Tools Homepage

Source: BUGTRAQ
Type: UNKNOWN
20040614 authentication bug in KAME's racoon

Source: BUGTRAQ
Type: UNKNOWN
20040615 Re: authentication bug in KAME's racoon

Source: CCN
Type: RHSA-2004-308
ipsec-tools security update

Source: CCN
Type: SA11863
KAME Racoon X.509 Certificate Validation Vulnerability

Source: SECUNIA
Type: UNKNOWN
11863

Source: CCN
Type: SA11877
IPsec-Tools Denial of Service and Certificate Validation Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
11877

Source: GENTOO
Type: Patch, Vendor Advisory
GLSA-200406-17

Source: CCN
Type: SECTRACK ID: 1010495
KAME Racoon May Validate Invalid Certificates

Source: SECTRACK
Type: UNKNOWN
1010495

Source: CCN
Type: IPsec Tools Release Notes Web page
Project: Linux IPsec Tools: Release Notes

Source: CONFIRM
Type: UNKNOWN
http://sourceforge.net/project/shownotes.php?release_id=245982

Source: CCN
Type: CIAC Information Bulletin O-212
Apple Security Update

Source: CCN
Type: GLSA-200406-17
IPsec-Tools: authentication bug in racoon

Source: CCN
Type: GLSA 200406-17
IPsec-Tools: authentication bug in racoon

Source: OSVDB
Type: UNKNOWN
7113

Source: CCN
Type: OSVDB ID: 7113
KAME Racoon X.509 Invalid Certificate Validation

Source: REDHAT
Type: UNKNOWN
RHSA-2004:308

Source: BID
Type: Vendor Advisory
10546

Source: CCN
Type: BID-10546
KAME Racoon IDE Daemon X.509 Improper Certificate Verification Vulnerability

Source: XF
Type: UNKNOWN
racoon-eaycheckx509cert-auth-bypass(16414)

Source: XF
Type: UNKNOWN
racoon-eaycheckx509cert-auth-bypass(16414)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9163

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ipsec-tools:ipsec-tools:0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ipsec-tools:ipsec-tools:0.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ipsec-tools:ipsec-tools:0.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ipsec-tools:ipsec-tools:0.3_rc1:*:*:*:*:*:*:*
  • OR cpe:/a:ipsec-tools:ipsec-tools:0.3_rc2:*:*:*:*:*:*:*
  • OR cpe:/a:ipsec-tools:ipsec-tools:0.3_rc3:*:*:*:*:*:*:*
  • OR cpe:/a:ipsec-tools:ipsec-tools:0.3_rc4:*:*:*:*:*:*:*
  • OR cpe:/a:ipsec-tools:ipsec-tools:0.3_rc5:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:*:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2003-07-11:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2004-04-05:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2004-04-07b:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2004-05-03:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:9163
    V
    The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote attackers to bypass authentication.
    2013-04-29
    oval:com.redhat.rhsa:def:20040308
    P
    RHSA-2004:308: ipsec-tools security update (Important)
    2004-07-29
    BACK
    ipsec-tools ipsec-tools 0.3
    ipsec-tools ipsec-tools 0.3.1
    ipsec-tools ipsec-tools 0.3.2
    ipsec-tools ipsec-tools 0.3_rc1
    ipsec-tools ipsec-tools 0.3_rc2
    ipsec-tools ipsec-tools 0.3_rc3
    ipsec-tools ipsec-tools 0.3_rc4
    ipsec-tools ipsec-tools 0.3_rc5
    kame racoon *
    kame racoon 2003-07-11
    kame racoon 2004-04-05
    kame racoon 2004-04-07b
    kame racoon 2004-05-03
    redhat enterprise linux 3.0
    redhat enterprise linux 3.0
    redhat enterprise linux 3.0
    redhat enterprise linux desktop 3.0