GLSA-200406-17 : IPsec-Tools: authentication bug in racoon

This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200406-17
(IPsec-Tools: authentication bug in racoon)

The KAME IKE daemon racoon is used to authenticate peers during Phase 1
when using either preshared keys, GSS-API, or RSA signatures. When
using RSA signatures racoon validates the X.509 certificate but not the
RSA signature.

Impact :

By sending a valid and trusted X.509 certificate and any private key an
attacker could exploit this vulnerability to perform man-in-the-middle
attacks and initiate unauthorized connections.

Workaround :

There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version.

See also :

Solution :

All IPsec-Tools users should upgrade to the latest stable version:
# emerge sync
# emerge -pv '>=net-firewall/ipsec-tools-0.3.3'
# emerge '>=net-firewall/ipsec-tools-0.3.3'

Risk factor :

Critical / CVSS Base Score : 10.0

Family: Gentoo Local Security Checks

Nessus Plugin ID: 14528 (gentoo_GLSA-200406-17.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0155

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now