Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Denial of Service >> Racoon invalid cookie malloc bug


Vulnerability Assessment Details

Racoon invalid cookie malloc bug

Vulnerability Assessment Summary
Racoon invalid cookie malloc bug

Detailed Explanation for this Vulnerability Assessment

The remote system appears to have a problem with processing
invalid requests with invalid cookie values. At least one
VPN product (racoon) demonstrates this flaw. Racoon is integrated
with:

FreeBSD 4.0 and beyond
OpenBSD 2.7 and beyond
NetBSD 1.5 and beyond
BSD/OS 4.2 and beyond

However, the bug has only been verified on FreeBSD systems.

A possible hacker may use this flaw to disable your VPN remotely.

Solution : If you are running racoon VPN, download and install
the latest SNAP kit from http://www.kame.net. If you are running
a non-racoon VPN server which is crashing due to this check, consult
your vendor for a fix.

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

intel core i7 6400t processor QHQG, Q0, socket 1151
$199.0
intel core i7 6400t processor QHQG, Q0, socket 1151 pictureIntel Core i7-2600K 3.4GHz Quad-Core (BX80623I72600K) Processor
$139.99
Intel Core i7-2600K 3.4GHz Quad-Core (BX80623I72600K) Processor pictureIntel Xeon E5606 SLC2N 2.13GHz Quad Core LGA 1366 Processor CPU
$5.0
Intel Xeon E5606 SLC2N 2.13GHz Quad Core LGA 1366 Processor CPU pictureintel core i3-2100 CPU with cooler - tested & working
$32.99
intel core i3-2100 CPU with cooler - tested & working picture


Discussions

No Discussions have been posted on this vulnerability.