Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2004-0164Racoon vulnerability

7 documents6 sources
Severity
5.0MEDIUMNVD
EPSS
12.7%
top 6.00%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMar 3
Latest updateMay 3

Description

KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c.

CVSS vector

AV:N/AC:L/C:N/I:P/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages1 packages

NVDkame/racoonall_versions

🔴Vulnerability Details

2
GHSA
GHSA-2q54-wx6q-7cqc: KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message t2022-05-03
CVEList
CVE-2004-0164: KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message t2004-02-19

💥Exploits & PoCs

1
Exploit-DB
KAME Racoon - 'Initial Contact' SA Deletion2004-01-14

📋Vendor Advisories

1
Red Hat
security flaw2004-01-13

💬Community

2
Bugzilla
CVE-2004-0164 security flaw2018-08-16
Bugzilla
CAN-2004-0155/CAN-2004-0164/CAN-2004-0403 IPSEC vulnerabilities2004-04-07
CVE-2004-0164 — Kame Racoon vulnerability | cvebase