First published: Mon May 18 2009(Updated: )
The ipsec-tools package is used in conjunction with the IPsec functionality<br>in the Linux kernel and includes racoon, an IKEv1 keying daemon.<br>A denial of service flaw was found in the ipsec-tools racoon daemon. An<br>unauthenticated, remote attacker could trigger a NULL pointer dereference<br>that could cause the racoon daemon to crash. (CVE-2009-1574)<br>Multiple memory leak flaws were found in the ipsec-tools racoon daemon. If<br>a remote attacker is able to make multiple connection attempts to the<br>racoon daemon, it was possible to cause the racoon daemon to consume all<br>available memory. (CVE-2009-1632)<br>Users of ipsec-tools should upgrade to this updated package, which contains<br>backported patches to correct these issues. Users must restart the racoon<br>daemon for this update to take effect.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ipsec-tools | <0.6.5-13.el5_3.1 | 0.6.5-13.el5_3.1 |
redhat/ipsec-tools | <0.6.5-13.el5_3.1 | 0.6.5-13.el5_3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2009:1036 is classified as important.
To fix RHSA-2009:1036, update the ipsec-tools package to version 0.6.5-13.el5_3.1 or later.
RHSA-2009:1036 is a denial of service vulnerability in the ipsec-tools racoon daemon.
RHSA-2009:1036 affects users of the ipsec-tools package version 0.6.5-13.el5_3.1 and earlier.
Yes, RHSA-2009:1036 can be exploited by an unauthenticated remote attacker.