Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the ipsec packages
Detailed Explanation for this Vulnerability Assessment
An updated ipsec-tools package that fixes a bug in parsing of ISAKMP
is now available.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
The ipsec-tools package is used in conjunction with the IPsec functionality
in the linux kernel. The ipsec-tools package includes:
- setkey, a program to directly manipulate policies and SAs
- racoon, an IKEv1 keying daemon
A bug was found in the way the racoon daemon handled incoming ISAKMP
requests. It is possible that a possible hacker could crash the racoon daemon by
sending a specially crafted ISAKMP packet. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2005-0398 to
Additionally, the following issues have been fixed:
- racoon mishandled restarts in the existence of stale administration
- on Red Hat Enterprise Linux 4, racoon and setkey did not properly set up
forward policies, which prevented tunnels from working.
Users of ipsec-tools should upgrade to this updated package, which contains
backported patches, and is not vulnerable to these issues.
Solution : http://rhn.redhat.com/errata/RHSA-2005-232.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security
|Cooler Master Hyper 212 Evo CPU Cooler
|HP Chromebook 11 G4 Intel 2.16ghz CPU 11.6" Display 2GB Ram 16GB HD HDMI USB M36
|Intel Core i5-4570S 2.9GHz up to 3.6GHz SR14J LGA1150 Haswell CPU
|Pentium 4 double strike stamp error CPU (RARE) Collector's Item L@@K
No Discussions have been posted on this vulnerability.