|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2005:232|
The remote host is missing updates announced in
The ipsec-tools package is used in conjunction with the IPsec functionality
in the linux kernel. The ipsec-tools package includes:
- - setkey, a program to directly manipulate policies and SAs
- - racoon, an IKEv1 keying daemon
A bug was found in the way the racoon daemon handled incoming ISAKMP
requests. It is possible that an attacker could crash the racoon daemon by
sending a specially crafted ISAKMP packet. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2005-0398 to
Additionally, the following issues have been fixed:
- - racoon mishandled restarts in the presence of stale administration sockets.
- - on Red Hat Enterprise Linux 4, racoon and setkey did not properly set up
forward policies, which prevented tunnels from working.
Users of ipsec-tools should upgrade to this updated package, which contains
backported patches, and is not vulnerable to these issues.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : Medium
BugTraq ID: 12804|
Common Vulnerability Exposure (CVE) ID: CVE-2005-0398
XForce ISS Database: racoon-isakmp-header-dos(19707)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.