First published: Thu Feb 19 2004(Updated: )
KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
KAME Racoon | =all_versions |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2004-0164 is considered medium, as it can lead to the unauthorized deletion of certificates.
To fix CVE-2004-0164, it is recommended to update to the latest version of KAME racoon that addresses this vulnerability.
CVE-2004-0164 affects all versions of KAME racoon, which is used for VPN connections.
CVE-2004-0164 allows remote attackers to delete certificates through improperly handled messages.
While CVE-2004-0164 was reported in 2004, users of unsupported versions of KAME racoon may still be vulnerable unless they have mitigated the issue.