CVE-2008-3652

N/A Unknown
Published: August 13, 2008 Modified: April 23, 2026
View on NVD

Description

src/racoon/handler.c in racoon in ipsec-tools does not remove an "orphaned ph1" (phase 1) handle when it has been initiated remotely, which allows remote attackers to cause a denial of service (resource consumption).

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/31478
Source: secalert@redhat.com
http://secunia.com/advisories/31624
Source: secalert@redhat.com
http://secunia.com/advisories/32759
Source: secalert@redhat.com
http://secunia.com/advisories/32971
Source: secalert@redhat.com
http://secunia.com/advisories/35074
Source: secalert@redhat.com
http://support.apple.com/kb/HT3549
Source: secalert@redhat.com
http://support.apple.com/kb/HT3639
Source: secalert@redhat.com
http://www.securityfocus.com/bid/30657
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-641-1
Source: secalert@redhat.com
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
Source: secalert@redhat.com
US Government Resource
http://secunia.com/advisories/31478
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/31624
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32759
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32971
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35074
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200812-03.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT3549
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT3639
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2008:181
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0849.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/30657
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1020692
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-641-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2008/2378
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/2844
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/1297
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/1621
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=501026
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/44424
Source: af854a3a-2127-422b-91ae-364da2661108

51 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

ipsec-tools