ID CVE-2016-10396
Summary The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place.
References
Vulnerable Configurations
  • cpe:2.3:a:ipsec-tools:ipsec-tools:0.8.2
    cpe:2.3:a:ipsec-tools:ipsec-tools:0.8.2
CVSS
Base: 7.8
Impact:
Exploitability:
CWE CWE-407
CAPEC
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-0424-1.NASL
    description This update for ipsec-tools fixes one issue. This security issue was fixed : - CVE-2016-10396: The racoon daemon contained a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments that allowed a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order (bsc#1047443). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 106788
    published 2018-02-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=106788
    title SUSE SLES12 Security Update : ipsec-tools (SUSE-SU-2018:0424-1)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1044.NASL
    description The racoon daemon in IPsec-Tools 0.8.2 and earlier contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place. For Debian 7 'Wheezy', these problems have been fixed in version 1:0.8.0-14+deb7u2. We recommend that you upgrade your ipsec-tools packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-06
    plugin id 102042
    published 2017-07-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=102042
    title Debian DLA-1044-1 : ipsec-tools security update
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-0423-1.NASL
    description This update for ipsec-tools fixes one issue. This security issue was fixed : - CVE-2016-10396: The racoon daemon contained a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments that allowed a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order (bsc#1047443). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 106787
    published 2018-02-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=106787
    title SUSE SLES11 Security Update : ipsec-tools (SUSE-SU-2018:0423-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-159.NASL
    description This update for ipsec-tools fixes one issue. This security issue was fixed : - CVE-2016-10396: The racoon daemon contained a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments that allowed a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order (bsc#1047443). This update was imported from the SUSE:SLE-12:Update update project.
    last seen 2019-02-21
    modified 2018-02-14
    plugin id 106814
    published 2018-02-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=106814
    title openSUSE Security Update : ipsec-tools (openSUSE-2018-159)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_974A6D323FDA11E8AEA4001B216D295B.NASL
    description Robert Foggia via NetBSD GNATS reports : The ipsec-tools racoon daemon contains a remotely exploitable computational complexity attack when parsing and storing isakmp fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending isakmp fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 109054
    published 2018-04-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109054
    title FreeBSD : ipsec-tools -- remotely exploitable computational-complexity attack (974a6d32-3fda-11e8-aea4-001b216d295b)
refmap via4
confirm
Last major update 05-07-2017 - 21:29
Published 05-07-2017 - 21:29
Last modified 27-07-2017 - 13:52
Back to Top