Package name
Advisory ID
Affected versions
10.0 amd64 , 10.0 i586

Problem description

A vulnerability in racoon prior to version 20040408a would allow a remote attacker to cause a DoS (memory consumption) via an ISAKMP packet with a large length field. Another vulnerability in racoon was discovered where, when using RSA signatures, racoon would validate the X.509 certificate but would not validate the signature. This can be exploited by an attacker sending a valid and trusted X.509 certificate and any private key. Using this, they could perform a man-in-the-middle attack and initiate an unauthorized connection. This has been fixed in ipsec-tools 0.3.3. The updated packages contain patches backported from 0.3.3 to correct the problem.

Updated packages

10.0 amd64

 8b2e591752ca3993bf7d9990663740a4  amd64/10.0/RPMS/ipsec-tools-0.2.5-0.2.100mdk.amd64.rpm
7a02dfbed6e643882cd869035b6054d8  amd64/10.0/RPMS/lib64ipsec-tools0-0.2.5-0.2.100mdk.amd64.rpm
f1b257c9ba3246fc613b5626d3cd4c0e  amd64/10.0/SRPMS/ipsec-tools-0.2.5-0.2.100mdk.src.rpm

10.0 i586

 d08dd4e8cc6a05a76dc47f80d566d137  10.0/RPMS/ipsec-tools-0.2.5-0.2.100mdk.i586.rpm
a3714e12936a4ed9db1438056eab451f  10.0/RPMS/libipsec-tools0-0.2.5-0.2.100mdk.i586.rpm
f1b257c9ba3246fc613b5626d3cd4c0e  10.0/SRPMS/ipsec-tools-0.2.5-0.2.100mdk.src.rpm