This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.
The remote server is vulnerable to a denial of service.
The remote system appears to have a problem with processing requests
with invalid cookie values. At least one VPN product (racoon)
demonstrates this flaw. Racoon is integrated with:
FreeBSD 4.0 and beyond OpenBSD 2.7 and beyond NetBSD 1.5 and beyond
BSD/OS 4.2 and beyond
However, the bug has only been verified on FreeBSD systems.
An attacker may use this flaw to disable your VPN remotely.
If you are running racoon VPN, download and install the latest SNAP
kit from http://www.kame.net/. If you are running a non-racoon VPN
server that is crashing due to this check, consult your vendor for a
Risk factor :
Medium / CVSS Base Score : 5.0
Family: Denial of Service
Nessus Plugin ID: 12121 ()
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.