blob: cf4baf5293265923dff3aa407741a1affd666cf3 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200406-17">
<title>IPsec-Tools: authentication bug in racoon</title>
racoon provided as part of IPsec-Tools fails do proper authentication.
<product type="ebuild">IPsec-Tools</product>
<announced>June 22, 2004</announced>
<revised>May 22, 2006: 02</revised>
<package name="net-firewall/ipsec-tools" auto="yes" arch="*">
<unaffected range="ge">0.3.3</unaffected>
<vulnerable range="lt">0.3.3</vulnerable>
IPsec-Tools is a port of KAME's implementation of the IPsec utilities.
It contains a collection of network monitoring tools, including racoon,
ping, and ping6.
The KAME IKE daemon racoon is used to authenticate peers during Phase 1
when using either preshared keys, GSS-API, or RSA signatures. When
using RSA signatures racoon validates the X.509 certificate but not the
RSA signature.
<impact type="normal">
By sending a valid and trusted X.509 certificate and any private key an
attacker could exploit this vulnerability to perform man-in-the-middle
attacks and initiate unauthorized connections.
There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version.
All IPsec-Tools users should upgrade to the latest stable version:
# emerge sync
# emerge -pv &quot;&gt;=net-firewall/ipsec-tools-0.3.3&quot;
# emerge &quot;&gt;=net-firewall/ipsec-tools-0.3.3&quot;</code>
<uri link="">IPsec-Tools Advisory</uri>
<uri link="">CVE-2004-0155</uri>
<uri link="">CVE-2004-0607</uri>
<metadata tag="submitter">