Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Denial of Service >> Racoon invalid cookie malloc bug

Vulnerability Assessment Details

Racoon invalid cookie malloc bug

Vulnerability Assessment Summary
Racoon invalid cookie malloc bug

Detailed Explanation for this Vulnerability Assessment

The remote system appears to have a problem with processing
invalid requests with invalid cookie values. At least one
VPN product (racoon) demonstrates this flaw. Racoon is integrated

FreeBSD 4.0 and beyond
OpenBSD 2.7 and beyond
NetBSD 1.5 and beyond
BSD/OS 4.2 and beyond

However, the bug has only been verified on FreeBSD systems.

A possible hacker may use this flaw to disable your VPN remotely.

Solution : If you are running racoon VPN, download and install
the latest SNAP kit from If you are running
a non-racoon VPN server which is crashing due to this check, consult
your vendor for a fix.

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

AS IS Lenovo G780 17.3" i5-3230M 2.6GHz 8GB RAM 1TB HDD READ
AS IS Lenovo G780 17.3Lenovo (0A33932) Thinkpad X220 Ultrabase Docking Station
Lenovo (0A33932) Thinkpad X220 Ultrabase Docking Station pictureIBM 3490-F01 Tape drive
IBM 3490-F01 Tape drive pictureLenovo Think Pad X1 Tablet 12" FHD+ m5-6Y57 8GB 256GB W10P + Kbrd 20GG001KUS U
Lenovo Think Pad X1 Tablet 12


No Discussions have been posted on this vulnerability.