Vulnerability Description
Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication with X.509 certificates, related to the eay_check_x509sign function in src/racoon/crypto_openssl.c; and (2) the NAT-Traversal (aka NAT-T) keepalive implementation, related to src/racoon/nattraversal.c.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ipsec-Tools | Ipsec-Tools | <= 0.7.1 |
Related Weaknesses (CWE)
References
- http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/crypt
- http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/crypt
- http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/nattr
- http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/nattr
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
- http://marc.info/?l=oss-security&m=124101704828036&w=2
- http://secunia.com/advisories/35153
- http://secunia.com/advisories/35159
- http://secunia.com/advisories/35212
- http://secunia.com/advisories/35404
- http://secunia.com/advisories/35685
- http://security.gentoo.org/glsa/glsa-200905-03.xml
- http://sourceforge.net/mailarchive/forum.php?thread_name=20090422151825.GB46988%Patch
FAQ
What is CVE-2009-1632?
CVE-2009-1632 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication w...
How severe is CVE-2009-1632?
CVE-2009-1632 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-1632?
Check the references section above for vendor advisories and patch information. Affected products include: Ipsec-Tools Ipsec-Tools.