CVE-2016-10396
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place.
El demonio racoon en IPsec-Tools versión 0.8.2 contiene un ataque de complejidad computacional explotable remotamente al analizar y almacenar fragmentos ISAKMP. La implementación permite que un atacante remoto agote los recursos computacionales en el endpoint remoto mediante el envío repetido de paquetes de fragmentos ISAKMP en un orden determinado de modo que la complejidad computacional del peor de los casos se realice en el algoritmo utilizado para determinar si el reensamblaje de los fragmentos puede tener lugar.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-07-05 CVE Reserved
- 2017-07-06 CVE Published
- 2024-09-16 CVE Updated
- 2024-09-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-407: Inefficient Algorithmic Complexity
CAPEC
References (3)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ipsec-tools Search vendor "Ipsec-tools" | Ipsec-tools Search vendor "Ipsec-tools" for product "Ipsec-tools" | 0.8.2 Search vendor "Ipsec-tools" for product "Ipsec-tools" and version "0.8.2" | - |
Affected
|