Vulnerability Name:

CVE-2005-0398 (CCN-19707)

Assigned:2005-03-09
Published:2005-03-09
Updated:2017-10-11
Summary:The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: SGI Security Advisory 20050304-01-U
SGI Advanced Linux Environment 3 Security Update #32

Source: MITRE
Type: CNA
CVE-2005-0398

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2005:971
Fixes for ipsec-tools

Source: CCN
Type: RHSA-2005-232
ipsec-tools security update

Source: CCN
Type: SA14584
KAME Racoon ISAKMP Header Parsing Denial of Service

Source: SECUNIA
Type: Patch, Vendor Advisory
14584

Source: GENTOO
Type: Patch, Vendor Advisory
GLSA-200503-33

Source: CCN
Type: SECTRACK ID: 1013433
Racoon Input Validation Error in ISAKMP Generic Header Length Field Lets Remote Users Deny Service

Source: SECTRACK
Type: Patch, Vendor Advisory
1013433

Source: MLIST
Type: Patch, Vendor Advisory
[ipsec-tools-devel] 20050312 potential remote crash in racoon

Source: CCN
Type: GLSA-200503-33
IPsec-Tools: racoon Denial of Service

Source: CCN
Type: KAME-snap kit Web page
KAME-snap kit

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2005:062

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2005:232

Source: BID
Type: Patch, Vendor Advisory
12804

Source: CCN
Type: BID-12804
KAME Racoon Malformed ISAKMP Packet Headers Denial of Service Vulnerability

Source: CCN
Type: TLSA-2005-40
DoS vulnerability in ipsec-tools

Source: CCN
Type: USN-107-1
racoon vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2005-0264

Source: MISC
Type: Patch, Vendor Advisory
https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=109966&action=view

Source: XF
Type: UNKNOWN
racoon-isakmp-header-dos(19707)

Source: XF
Type: UNKNOWN
racoon-isakmp-header-dos(19707)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10028

Source: SUSE
Type: SUSE-SA:2005:020
ipsec-tools: remote denial of service

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ipsec-tools:ipsec-tools:0.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:ipsec-tools:ipsec-tools:0.5:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2003-07-11:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2004-04-05:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2004-04-07b:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2004-05-03:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2005-01-03:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2005-01-10:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2005-01-17:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2005-01-24:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2005-01-31:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2005-02-07:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2005-02-14:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2005-02-21:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2005-02-28:*:*:*:*:*:*:*
  • OR cpe:/a:kame:racoon:2005-03-07:*:*:*:*:*:*:*
  • OR cpe:/a:sgi:propack:3.0:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:altlinux:alt_linux:2.3:*:compact:*:*:*:*:*
  • OR cpe:/o:altlinux:alt_linux:2.3:*:junior:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:*:*:desktop:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:*:*:enterprise_server:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:10028
    V
    The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets.
    2013-04-29
    oval:com.redhat.rhsa:def:20050232
    P
    RHSA-2005:232: ipsec-tools security update (Moderate)
    2005-03-23
    BACK
    ipsec-tools ipsec-tools 0.3.3
    ipsec-tools ipsec-tools 0.5
    kame racoon 2003-07-11
    kame racoon 2004-04-05
    kame racoon 2004-04-07b
    kame racoon 2004-05-03
    kame racoon 2005-01-03
    kame racoon 2005-01-10
    kame racoon 2005-01-17
    kame racoon 2005-01-24
    kame racoon 2005-01-31
    kame racoon 2005-02-07
    kame racoon 2005-02-14
    kame racoon 2005-02-21
    kame racoon 2005-02-28
    kame racoon 2005-03-07
    sgi propack 3.0
    altlinux alt linux 2.3
    altlinux alt linux 2.3
    redhat enterprise linux 3.0
    redhat enterprise linux 3.0
    redhat enterprise linux 3.0
    redhat enterprise linux 4.0
    redhat enterprise linux 4.0
    redhat enterprise linux 4.0
    redhat enterprise linux desktop 3.0
    redhat enterprise linux desktop 4.0
    suse suse linux *
    suse suse linux *
    suse suse linux 9.1
    suse suse linux 9.1
    suse suse linux 9.2
    suse suse linux 9.2