CVE-2004-0403
https://notcve.org/view.php?id=CVE-2004-0403
Racoon before 20040408a allows remote attackers to cause a denial of service (memory consumption) via an ISAKMP packet with a large length field. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.10/SCOSA-2005.10.txt ftp://patches.sgi.com/support/free/security/advisories/20040506-01-U.asc http://marc.info/?l=bugtraq&m=108369640424244&w=2 http://secunia.com/advisories/11410 http://secunia.com/advisories/11877 http://security.gentoo.org/glsa/glsa-200404-17.xml http://securitytracker.com/id?1009937 http://sourceforge.net/project/shownotes.php?release_id=232288 http://www.kame.net/dev/cvsweb2.cgi/kame/kame/kame/ •
CVE-2004-0155
https://notcve.org/view.php?id=CVE-2004-0155
The KAME IKE Daemon Racoon, when authenticating a peer during Phase 1, validates the X.509 certificate but does not verify the RSA signature authentication, which allows remote attackers to establish unauthorized IP connections or conduct man-in-the-middle attacks using a valid, trusted X.509 certificate. El KAME IKE Daemon Racoon, cuando autentica a un semejante durante la Fase 1, valida el certificado X.509 pero no verifica la autenticación de firma RSA, lo que permite a atacantes remotos establecer conexiones IP no autorizadas o relizar ataques del tipo "hombre en el medio" usando un certificado X.509 válido y de confianza. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.10/SCOSA-2005.10.txt http://marc.info/?l=bugtraq&m=108136746911000&w=2 http://marc.info/?l=bugtraq&m=108369640424244&w=2 http://secunia.com/advisories/11328 http://www.gentoo.org/security/en/glsa/glsa-200406-17.xml http://www.kb.cert.org/vuls/id/552398 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:069 http://www.mandriva.com/security/advisories?name=MDKSA-2004:027 http://www.redhat •
CVE-2004-0164 – KAME Racoon - 'Initial Contact' SA Deletion
https://notcve.org/view.php?id=CVE-2004-0164
KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c. El demonio KAME IKE (racoon) no maneja adecuadamente valores de extractos (hash) lo que permite a atacantes remotos borrar certificados mediante (1) un cierto mensaje de borrado que no es manejado adecuadamente en isakmp.c o isakmp_inf.c, o (2) un cierto mensaje INITIAL-CONTACT que no es manejado adecuadamente en isakmp_inf.c. • https://www.exploit-db.com/exploits/23540 ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-001.txt.asc http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html http://marc.info/?l=bugtraq&m=107403331309838&w=2 http://marc.info/?l=bugtraq&m=107411758202662&w=2 http://www.securityfocus.com/bid/9416 http://www.securityfocus.com/bid/9417 https://exchange.xforce.ibmcloud.com/vulnerabilities/14117 https://exchange.xforce.ibmcloud.com/vulnerabilities/141 •