8 results (0.011 seconds)

CVSS: 7.5EPSS: 2%CPEs: 3EXPL: 1

10 Sep 2008 — The mld_input function in sys/netinet6/mld6.c in the kernel in NetBSD 4.0, FreeBSD, and KAME, when INET6 is enabled, allows remote attackers to cause a denial of service (divide-by-zero error and panic) via a malformed ICMPv6 Multicast Listener Discovery (MLD) query with a certain Maximum Response Delay value. La Función mld_input en sys/netinet6/mld6.c in the kernel en NetBSD 4.0, FreeBSD, y KAME, cuando INET6 está habilitado, permite a atacantes remotos provocar una denegación de servicio (Error de divisi... • http://cert.fi/haavoittuvuudet/2008/advisory-netbsd.html • CWE-189: Numeric Errors •

CVSS: 7.8EPSS: 28%CPEs: 1EXPL: 1

07 Feb 2008 — The ipcomp6_input function in sys/netinet6/ipcomp_input.c in the KAME project before 20071201 does not properly check the return value of the m_pulldown function, which allows remote attackers to cause a denial of service (system crash) via an IPv6 packet with an IPComp header. La función ipcomp6_input en sys/netinet6/ipcomp_input.c en el Proyecto KAME antes del 2007-12-01 no comprueba correctamente el valor de retorno de la función m_pulldown, lo que permite a atacantes remotos provocar una denegación de s... • https://www.exploit-db.com/exploits/5191 •

CVSS: 7.5EPSS: 4%CPEs: 33EXPL: 0

14 Mar 2005 — The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets. • http://secunia.com/advisories/14584 •

CVSS: 10.0EPSS: 11%CPEs: 17EXPL: 0

30 Jun 2004 — The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote attackers to bypass authentication. La función eay_check_x509cert en KAME Racoon verifica como buenos certificados incluso cuando la validación OpenSLL falla, lo que podría permitir a atacantes remotos saltarse la autenticación. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.10/SCOSA-2005.10.txt •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

06 May 2004 — racoon before 20040407b allows remote attackers to cause a denial of service (infinite loop and dropped connections) via an IKE message with a malformed Generic Payload Header containing invalid (1) "Security Association Next Payload" and (2) "RESERVED" fields. racoon anteriores a 20040407b permite a atacantes remotos causar una denegación de servicio (bucle infinito y conexiones descartadas) mediante un mensaje IKE con una cabecera de carga útil (paiload) genérica malformada, conteniendo campos (1) "Securi... • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.10/SCOSA-2005.10.txt •

CVSS: 7.5EPSS: 4%CPEs: 1EXPL: 0

16 Apr 2004 — The KAME IKE Daemon Racoon, when authenticating a peer during Phase 1, validates the X.509 certificate but does not verify the RSA signature authentication, which allows remote attackers to establish unauthorized IP connections or conduct man-in-the-middle attacks using a valid, trusted X.509 certificate. El KAME IKE Daemon Racoon, cuando autentica a un semejante durante la Fase 1, valida el certificado X.509 pero no verifica la autenticación de firma RSA, lo que permite a atacantes remotos establecer conex... • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.10/SCOSA-2005.10.txt •

CVSS: 7.5EPSS: 13%CPEs: 1EXPL: 1

16 Apr 2004 — Racoon before 20040408a allows remote attackers to cause a denial of service (memory consumption) via an ISAKMP packet with a large length field. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.10/SCOSA-2005.10.txt •

CVSS: 7.5EPSS: 12%CPEs: 1EXPL: 1

19 Feb 2004 — KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c. El demonio KAME IKE (racoon) no maneja adecuadamente valores de extractos (hash) lo que permite a atacantes remotos borrar certificados mediante (1) un cierto mensaje de borrado que no es manejado adecuadamente en isak... • https://www.exploit-db.com/exploits/23540 •