FreeBSD : racoon remote denial of service vulnerability (IKE Generic Payload Header) (40fcf20f-8891-11d8-90d1-0020ed76ef5a)

medium Nessus Plugin ID 18917

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

When racoon receives an IKE message with an incorrectly constructed Generic Payload Header, it may behave erratically, going into a tight loop and dropping connections.

Solution

Update the affected package.

See Also

http://orange.kame.net/dev/query-pr.cgi?pr=555

http://www.nessus.org/u?b2c8d170

Plugin Details

Severity: Medium

ID: 18917

File Name: freebsd_pkg_40fcf20f889111d890d10020ed76ef5a.nasl

Version: 1.14

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/o:freebsd:freebsd, p-cpe:/a:freebsd:freebsd:racoon

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 4/7/2004

Vulnerability Publication Date: 12/3/2003

Reference Information

CVE: CVE-2004-0392