First published: Tue Aug 26 2008(Updated: )
The ipsec-tools package is used in conjunction with the IPsec functionality<br>in the Linux kernel and includes racoon, an IKEv1 keying daemon.<br>Two denial of service flaws were found in the ipsec-tools racoon daemon. It<br>was possible for a remote attacker to cause the racoon daemon to consume<br>all available memory. (CVE-2008-3651, CVE-2008-3652)<br>Users of ipsec-tools should upgrade to this updated package, which contains<br>backported patches that resolve these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ipsec-tools | <0.6.5-9.el5_2.3 | 0.6.5-9.el5_2.3 |
redhat/ipsec-tools | <0.6.5-9.el5_2.3 | 0.6.5-9.el5_2.3 |
redhat/ipsec-tools | <0.3.3-7.el4_7 | 0.3.3-7.el4_7 |
redhat/ipsec-tools | <0.3.3-7.el4_7 | 0.3.3-7.el4_7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2008:0849 is classified as important due to the potential for denial of service attacks.
To fix RHSA-2008:0849, users should upgrade the ipsec-tools package to version 0.6.5-9.el5_2.3 or 0.3.3-7.el4_7 as applicable.
RHSA-2008:0849 addresses two denial of service vulnerabilities in the racoon daemon of the ipsec-tools package.
Versions up to 0.6.5-9.el5_2.3 for el5 and up to 0.3.3-7.el4_7 for el4 are affected by RHSA-2008:0849.
Yes, RHSA-2008:0849 can be exploited remotely by an attacker to cause a denial of service.