CVE-2016-10396
Summary
| CVE | CVE-2016-10396 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-07-06 01:29:00 UTC |
| Updated | 2017-07-27 17:52:00 UTC |
| Description | The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| gnats.netbsd.org/cgi-bin/query-pr-single.pl |
CONFIRM |
gnats.netbsd.org |
Mailing List, Third Party Advisory |
| cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/isakmp_frag... |
CONFIRM |
cvsweb.netbsd.org |
Mailing List, Third Party Advisory |
| CVS log for src/crypto/dist/ipsec-tools/src/racoon/isakmp_frag.c |
CONFIRM |
cvsweb.netbsd.org |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 690344 Free Berkeley Software Distribution (FreeBSD) Security Update for ipsec-tools (974a6d32-3fda-11e8-aea4-001b216d295b)