Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication with X.509 certificates, related to the eay_check_x509sign function in src/racoon/crypto_openssl.c; and (2) the NAT-Traversal (aka NAT-T) keepalive implementation, related to src/racoon/nattraversal.c.
References
Link Providers
http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/crypto_openssl.c cve-icon cve-icon
http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/crypto_openssl.c.diff?r1=1.11.6.4&r2=1.11.6.5&f=h cve-icon cve-icon
http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/nattraversal.c cve-icon cve-icon
http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/nattraversal.c.diff?r1=1.6&r2=1.6.6.1&f=h cve-icon cve-icon
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html cve-icon cve-icon
http://marc.info/?l=oss-security&m=124101704828036&w=2 cve-icon cve-icon
http://secunia.com/advisories/35153 cve-icon cve-icon
http://secunia.com/advisories/35159 cve-icon cve-icon
http://secunia.com/advisories/35212 cve-icon cve-icon
http://secunia.com/advisories/35404 cve-icon cve-icon
http://secunia.com/advisories/35685 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200905-03.xml cve-icon cve-icon
http://sourceforge.net/mailarchive/forum.php?thread_name=20090422151825.GB46988%40zeninc.net&forum_name=ipsec-tools-announce cve-icon cve-icon
http://sourceforge.net/project/shownotes.php?group_id=74601&release_id=677611 cve-icon cve-icon
http://support.apple.com/kb/HT3937 cve-icon cve-icon
http://www.debian.org/security/2009/dsa-1804 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2009:114 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2009/05/12/3 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2009-1036.html cve-icon cve-icon
http://www.securityfocus.com/bid/34765 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-785-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/3184 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2009-1632 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10581 cve-icon cve-icon
https://trac.ipsec-tools.net/ticket/303 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2009-1632 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2009-05-14T17:00:00

Updated: 2024-08-07T05:20:34.877Z

Reserved: 2009-05-14T00:00:00

Link: CVE-2009-1632

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2009-05-14T17:30:00.813

Modified: 2024-11-21T01:02:57.090

Link: CVE-2009-1632

cve-icon Redhat

Severity : Moderate

Publid Date: 2009-04-22T00:00:00Z

Links: CVE-2009-1632 - Bugzilla