Ubuntu Security Notice USN-785-1 - It was discovered that ipsec-tools did not properly handle certain fragmented packets. A remote attacker could send specially crafted packets to the server and cause a denial of service. It was discovered that ipsec-tools did not properly handle memory usage when verifying certificate signatures or processing nat-traversal keep-alive messages. A remote attacker could send specially crafted packets to the server and exhaust available memory, leading to a denial of service.
208e147ce29e65f7d8f96691927f0fe32948bb42223fd69447cd79efea688f99
Gentoo Linux Security Advisory GLSA 200905-03 - Multiple errors in the IPSec Tools racoon daemon might allow remote attackers to cause a Denial of Service. Versions less than 0.7.2 are affected.
79db0186e0cc0dc495c6259888fc48f6fb06ba32880bced4aca533b1b5782725
Debian Security Advisory 1804-1 - Several remote vulnerabilities have been discovered in racoon, the Internet Key Exchange daemon of ipsec-tools. The The Common Vulnerabilities and Exposures project identified the
b05210a0a0059e39b906612cffac26f4bf213a579ea7b6061e4b07d926b8d381
Mandriva Linux Security Advisory 2009-114 - Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication with X.509 certificates, related to the eay_check_x509sign function in src/racoon/crypto_openssl.c; and (2) the NAT-Traversal (aka NAT-T) keepalive implementation, related to src/racoon/nattraversal.c. The updated packages have been patched to prevent this.
b06f40b765bf5878211ac80e0c4251bc235d0aaeb3f3c945a399bbc31a08bbb6