The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place.
Find out more about CVE-2016-10396 from the MITRE-CVE dictionary and NIST NVD
Login may be required to access defects or downloads.
Product Name | Status | Defect | Fixed | Downloads |
---|---|---|---|---|
Linux | ||||
Wind River Linux LTS 17 | Fixed | -- | 10.17.41.1 | -- |
Wind River Linux 8 | Fixed |
LIN8-7090 |
8.0.0.20 | -- |
Wind River Linux 9 | Fixed |
LIN9-4649 |
9.0.0.9 | -- |
Wind River Linux 7 | Fixed | -- | 7.0.0.26 | -- |
Wind River Linux LTS 21 | Not Vulnerable | -- | -- | -- |
Wind River Linux LTS 22 | Not Vulnerable | -- | -- | -- |
Wind River Linux LTS 18 | Fixed | -- | 10.18.44.1 | -- |
Wind River Linux LTS 19 | Fixed | -- | 10.19.45.1 | -- |
Wind River Linux CD release | Not Vulnerable | -- | -- | -- |
Wind River Linux 6 | Fixed | -- | 6.0.0.35 | -- |
Wind River Linux LTS 23 | Not Vulnerable | -- | -- | -- |
Wind River Linux LTS 24 | Not Vulnerable | -- | -- | -- |
VxWorks | ||||
VxWorks 7 | Not Vulnerable | -- | -- | -- |
VxWorks 6.9 | Not Vulnerable | -- | -- | -- |
Helix Virtualization Platform Cert Edition | ||||
Helix Virtualization Platform Cert Edition | Not Vulnerable | -- | -- | -- |
eLxr | ||||
eLxr 12 | Not Vulnerable | -- | -- | -- |
Wind River Studio Cloud Platform |
Product Name | Status | Defect | Fixed | Downloads |
---|