Mandrake Linux Security Advisory : ipsec-tools (MDKSA-2004:069)

high Nessus Plugin ID 14168
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 5.5


The remote Mandrake Linux host is missing one or more security updates.


A vulnerability in racoon prior to version 20040408a would allow a remote attacker to cause a DoS (memory consumption) via an ISAKMP packet with a large length field.

Another vulnerability in racoon was discovered where, when using RSA signatures, racoon would validate the X.509 certificate but would not validate the signature. This can be exploited by an attacker sending a valid and trusted X.509 certificate and any private key. Using this, they could perform a man-in-the-middle attack and initiate an unauthorized connection. This has been fixed in ipsec-tools 0.3.3.

The updated packages contain patches backported from 0.3.3 to correct the problem.


Update the affected ipsec-tools, lib64ipsec-tools0 and / or libipsec-tools0 packages.

Plugin Details

Severity: High

ID: 14168

File Name: mandrake_MDKSA-2004-069.nasl

Version: 1.20

Type: local

Published: 7/31/2004

Updated: 1/6/2021

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: High

VPR Score: 5.5

CVSS v2.0

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:ipsec-tools, p-cpe:/a:mandriva:linux:lib64ipsec-tools0, p-cpe:/a:mandriva:linux:libipsec-tools0, cpe:/o:mandrakesoft:mandrake_linux:10.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 7/14/2004

Reference Information

CVE: CVE-2004-0155, CVE-2004-0403

MDKSA: 2004:069