[Full-disclosure] SCOSA-2005.52 OpenServer 6.0.0 : KAME Racoon Daemon Denial of Service Vulnerability

Date: 11/28/05

Date: Mon, 28 Nov 2005 12:46:24 -0500 (EST)
To: security-announce@list.sco.com

Hash: SHA1


                         SCO Security Advisory

Subject: OpenServer 6.0.0 : KAME Racoon Daemon Denial of Service Vulnerability
Advisory number: SCOSA-2005.52
Issue date: 2005 November 28
Cross reference: sr895064 erg712954 fz533033


1. Problem Description

         Racoon is an IKEv1 keying daemon, a common IPSec Utility. Due
         to a bug in the way the Racoon parsed incoming ISAKMP packets,
         an attacker could possibly crash the racoon daemon by sending a
         specially crafted ISAKMP packet.

         The Common Vulnerabilities and Exposures project (cve.mitre.org)
         has assigned the name CVE-2005-0398 to this issue.

2. Vulnerable Supported Versions

         System Binaries
         OpenServer 6.0.0 /usr/sbin/racoon

3. Solution

         The proper solution is to install the latest packages.

4. OpenServer 6.0.0

         4.1 Location of Fixed Binaries


         4.2 Verification

         MD5 (VOL.000.000) = 6233d4a9b0aa683814f9d8041cf184fb

         md5 is available for download from

         4.3 Installing Fixed Binaries

         Upgrade the affected binaries with the following sequence:

         1) Download the VOL* files to a directory.

         2) Run the custom command, specify an install
            from media images, and specify the directory as
            the location of the images.

5. References

         Specific references for this advisory:

         SCO security resources:

         SCO security advisories via email

         This security fix closes SCO incidents sr895064 erg712954

6. Disclaimer

         SCO is not responsible for the misuse of any of the information
         we provide on this website and/or through our security
         advisories. Our advisories are a service to our customers
         intended to promote secure installation and use of SCO

7. Acknowledgments

         SCO would like to thank Sebastian Krahmer for reporting this

Version: GnuPG v1.4.2 (UnixWare)

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/