diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index abbdcf248bc0..0c34d800aa07 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,37 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + ipsec-tools -- remotely exploitable computational-complexity attack + + + ipsec-tools + 0.8.2_3 + + + + +

Robert Foggia via NetBSD GNATS reports:

+
+

The ipsec-tools racoon daemon contains a remotely exploitable computational + complexity attack when parsing and storing isakmp fragments. The implementation + permits a remote attacker to exhaust computational resources on the remote endpoint + by repeatedly sending isakmp fragment packets in a particular order such that + the worst-case computational complexity is realized in the algorithm utilized + to determine if reassembly of the fragments can take place.

+
+ +
+ + https://gnats.netbsd.org/cgi-bin/query-pr-single.pl?number=51682 + CVE-2016-10396 + + + 2016-12-02 + 2018-04-14 + +
+ nghttp2 -- Denial of service due to NULL pointer dereference