Описание
The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | released | 1:0.8.2+20140711-10 |
| bionic | released | 1:0.8.2+20140711-10 |
| cosmic | released | 1:0.8.2+20140711-10 |
| devel | DNE | |
| disco | released | 1:0.8.2+20140711-10 |
| eoan | DNE | |
| esm-apps/bionic | released | 1:0.8.2+20140711-10 |
| esm-apps/xenial | needed | |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| esm-infra/focal | DNE |
Показывать по
Ссылки на источники
7.8 High
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place.
The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place.
The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable ...
7.8 High
CVSS2
7.5 High
CVSS3