Synopsis
The remote server is vulnerable to a denial of service.
Description
The remote system appears to have a problem with processing requests with invalid cookie values. At least one VPN product (racoon) demonstrates this flaw. Racoon is integrated with:
FreeBSD 4.0 and beyond OpenBSD 2.7 and beyond NetBSD 1.5 and beyond BSD/OS 4.2 and beyond
However, the bug has only been verified on FreeBSD systems.
An attacker may use this flaw to disable your VPN remotely.
Solution
If you are running racoon VPN, download and install the latest SNAP kit from http://www.kame.net/. If you are running a non-racoon VPN server that is crashing due to this check, consult your vendor for a fix.
Plugin Details
File Name: racoon_cookie_malloc_dos.nasl
Configuration: Enable paranoid mode
Supported Sensors: Nessus
Vulnerability Information
Required KB Items: Settings/ParanoidReport