Description
KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Thomas Walpuski · cdosfreebsd
https://www.exploit-db.com/exploits/23540
References (10)
Scores
EPSS
0.1269
EPSS Percentile
94.0%
Details
Status
published
Products (1)
kame/racoon
all_versions
Published
Mar 03, 2004
Tracked Since
Feb 18, 2026