CVE
- Id
- 33768
- CVE No.
- CVE-2008-3651
- Status
- Candidate
- Description
- Memory leak in racoon/proposal.c in the racoon daemon in ipsec-tools before 0.7.1 allows remote authenticated users to cause a denial of service (memory consumption) via invalid proposals.
- Phase
- Assigned (20080812)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
367957 | 33768 | CVE-2008-3651 | MLIST:[ipsec-tools-devel] 20080724 Ipsec-tools 0.7.1 released | View |
367958 | 33768 | CVE-2008-3651 | URL:http://marc.info/?l=ipsec-tools-devel&m=121688914101709&w=2 | View |
367959 | 33768 | CVE-2008-3651 | MLIST:[ipsec-tools-announce] 20080724 Ipsec-tools 0.7.1 released | View |
367960 | 33768 | CVE-2008-3651 | URL:http://sourceforge.net/mailarchive/message.php?msg_name=20080724084529.GA3768%40zen.inc | View |
367961 | 33768 | CVE-2008-3651 | CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=456660 | View |
367962 | 33768 | CVE-2008-3651 | CONFIRM:http://sourceforge.net/project/shownotes.php?release_id=615380&group_id=74601 | View |
367963 | 33768 | CVE-2008-3651 | CONFIRM:http://support.apple.com/kb/HT3549 | View |
367964 | 33768 | CVE-2008-3651 | CONFIRM:http://support.apple.com/kb/HT3639 | View |
367965 | 33768 | CVE-2008-3651 | APPLE:APPLE-SA-2009-05-12 | View |
367966 | 33768 | CVE-2008-3651 | URL:http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | View |
367967 | 33768 | CVE-2008-3651 | APPLE:APPLE-SA-2009-06-17-1 | View |
367968 | 33768 | CVE-2008-3651 | URL:http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html | View |
367969 | 33768 | CVE-2008-3651 | GENTOO:GLSA-200812-03 | View |
367970 | 33768 | CVE-2008-3651 | URL:http://security.gentoo.org/glsa/glsa-200812-03.xml | View |
367971 | 33768 | CVE-2008-3651 | MANDRIVA:MDVSA-2008:181 | View |
367972 | 33768 | CVE-2008-3651 | URL:http://www.mandriva.com/security/advisories?name=MDVSA-2008:181 | View |
367973 | 33768 | CVE-2008-3651 | REDHAT:RHSA-2008:0849 | View |
367974 | 33768 | CVE-2008-3651 | URL:http://www.redhat.com/support/errata/RHSA-2008-0849.html | View |
367975 | 33768 | CVE-2008-3651 | SUSE:SUSE-SR:2008:025 | View |
367976 | 33768 | CVE-2008-3651 | URL:http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html | View |
367977 | 33768 | CVE-2008-3651 | SUSE:SUSE-SR:2009:004 | View |
367978 | 33768 | CVE-2008-3651 | URL:http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html | View |
367979 | 33768 | CVE-2008-3651 | UBUNTU:USN-641-1 | View |
367980 | 33768 | CVE-2008-3651 | URL:http://www.ubuntu.com/usn/usn-641-1 | View |
367981 | 33768 | CVE-2008-3651 | CERT:TA09-133A | View |
367982 | 33768 | CVE-2008-3651 | URL:http://www.us-cert.gov/cas/techalerts/TA09-133A.html | View |
367983 | 33768 | CVE-2008-3651 | BID:30657 | View |
367984 | 33768 | CVE-2008-3651 | URL:http://www.securityfocus.com/bid/30657 | View |
367985 | 33768 | CVE-2008-3651 | OVAL:oval:org.mitre.oval:def:10453 | View |
367986 | 33768 | CVE-2008-3651 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10453 | View |
367987 | 33768 | CVE-2008-3651 | SECUNIA:35074 | View |
367988 | 33768 | CVE-2008-3651 | URL:http://secunia.com/advisories/35074 | View |
367989 | 33768 | CVE-2008-3651 | VUPEN:ADV-2008-2345 | View |
367990 | 33768 | CVE-2008-3651 | URL:http://www.vupen.com/english/advisories/2008/2345 | View |
367991 | 33768 | CVE-2008-3651 | VUPEN:ADV-2008-2844 | View |
367992 | 33768 | CVE-2008-3651 | URL:http://www.vupen.com/english/advisories/2008/2844 | View |
367993 | 33768 | CVE-2008-3651 | SECTRACK:1020667 | View |
367994 | 33768 | CVE-2008-3651 | URL:http://www.securitytracker.com/id?1020667 | View |
367995 | 33768 | CVE-2008-3651 | SECUNIA:31450 | View |
367996 | 33768 | CVE-2008-3651 | URL:http://secunia.com/advisories/31450 | View |
367997 | 33768 | CVE-2008-3651 | SECUNIA:31624 | View |
367998 | 33768 | CVE-2008-3651 | URL:http://secunia.com/advisories/31624 | View |
367999 | 33768 | CVE-2008-3651 | SECUNIA:32759 | View |
368000 | 33768 | CVE-2008-3651 | URL:http://secunia.com/advisories/32759 | View |
368001 | 33768 | CVE-2008-3651 | SECUNIA:32971 | View |
368002 | 33768 | CVE-2008-3651 | URL:http://secunia.com/advisories/32971 | View |
368003 | 33768 | CVE-2008-3651 | VUPEN:ADV-2009-1297 | View |
368004 | 33768 | CVE-2008-3651 | URL:http://www.vupen.com/english/advisories/2009/1297 | View |
368005 | 33768 | CVE-2008-3651 | VUPEN:ADV-2009-1621 | View |
368006 | 33768 | CVE-2008-3651 | URL:http://www.vupen.com/english/advisories/2009/1621 | View |
368007 | 33768 | CVE-2008-3651 | XF:ipsectools-racoon-dos(44395) | View |
Related JVN
Id | JVN No. | Title | Summary | CVE No. | CVE Id | CVSS_v2 | CVSS_v3 | JVN URL | Actions |
---|---|---|---|---|---|---|---|---|---|
46569 | JVNDB-2008-001879 | Ruby の重要な変数とメソッドの処理に関わる適切なアクセス制限を回避される脆弱性 | Ruby には、重要な変数とメソッドのアクセス制限処理に不備があるため、アクセス制限を回避される脆弱性が存在します。 | CVE-2008-3655 | 33768 | 6.4 | http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-001879.html | View |