Show plain JSON{"id": "CVE-2008-3651", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "authentication": "SINGLE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2008-08-13T01:41:00.000", "references": [{"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html", "source": "secalert@redhat.com"}, {"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html", "source": "secalert@redhat.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html", "source": "secalert@redhat.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html", "source": "secalert@redhat.com"}, {"url": "http://marc.info/?l=ipsec-tools-devel&m=121688914101709&w=2", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/31450", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/31624", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/32759", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/32971", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/35074", "source": "secalert@redhat.com"}, {"url": "http://security.gentoo.org/glsa/glsa-200812-03.xml", "source": "secalert@redhat.com"}, {"url": "http://sourceforge.net/mailarchive/message.php?msg_name=20080724084529.GA3768%40zen.inc", "source": "secalert@redhat.com"}, {"url": "http://sourceforge.net/project/shownotes.php?release_id=615380&group_id=74601", "source": "secalert@redhat.com"}, {"url": "http://support.apple.com/kb/HT3549", "source": "secalert@redhat.com"}, {"url": "http://support.apple.com/kb/HT3639", "source": "secalert@redhat.com"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:181", "source": "secalert@redhat.com"}, {"url": "http://www.redhat.com/support/errata/RHSA-2008-0849.html", "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/30657", "source": "secalert@redhat.com"}, {"url": "http://www.securitytracker.com/id?1020667", "source": "secalert@redhat.com"}, {"url": "http://www.ubuntu.com/usn/usn-641-1", "source": "secalert@redhat.com"}, {"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html", "tags": ["US Government Resource"], "source": "secalert@redhat.com"}, {"url": "http://www.vupen.com/english/advisories/2008/2345", "source": "secalert@redhat.com"}, {"url": "http://www.vupen.com/english/advisories/2008/2844", "source": "secalert@redhat.com"}, {"url": "http://www.vupen.com/english/advisories/2009/1297", "source": "secalert@redhat.com"}, {"url": "http://www.vupen.com/english/advisories/2009/1621", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456660", "source": "secalert@redhat.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44395", "source": "secalert@redhat.com"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10453", "source": "secalert@redhat.com"}, {"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://marc.info/?l=ipsec-tools-devel&m=121688914101709&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/31450", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/31624", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/32759", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/32971", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/35074", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://security.gentoo.org/glsa/glsa-200812-03.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://sourceforge.net/mailarchive/message.php?msg_name=20080724084529.GA3768%40zen.inc", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://sourceforge.net/project/shownotes.php?release_id=615380&group_id=74601", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://support.apple.com/kb/HT3549", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://support.apple.com/kb/HT3639", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:181", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.redhat.com/support/errata/RHSA-2008-0849.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/30657", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1020667", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.ubuntu.com/usn/usn-641-1", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html", "tags": ["US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2008/2345", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2008/2844", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2009/1297", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2009/1621", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=456660", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44395", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10453", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-200"}]}], "descriptions": [{"lang": "en", "value": "Memory leak in racoon/proposal.c in the racoon daemon in ipsec-tools before 0.7.1 allows remote authenticated users to cause a denial of service (memory consumption) via invalid proposals."}, {"lang": "es", "value": "Fugas de memoria en racoon/proposal.c del demonio racoon en ipsec-tools versiones anteriores a 0.7.1 permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (agotamiento de memoria) a trav\u00e9s de propuestas inv\u00e1lidas."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:linux:ipsec_tools_racoon_daemon:0.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A69277A-A538-4875-9140-D1B568A63681"}, {"criteria": "cpe:2.3:a:linux:ipsec_tools_racoon_daemon:0.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2347ADA0-96EB-4459-8AFB-82390B710430"}, {"criteria": "cpe:2.3:a:linux:ipsec_tools_racoon_daemon:0.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22FC05B8-0779-40E5-B914-0E74A3E96E3E"}, {"criteria": "cpe:2.3:a:linux:ipsec_tools_racoon_daemon:0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C9A27FF-7B8E-4069-8550-B2646F5F8692"}, {"criteria": "cpe:2.3:a:linux:ipsec_tools_racoon_daemon:0.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB3E11FE-1F19-4816-BF99-EE192A361E06"}, {"criteria": "cpe:2.3:a:linux:ipsec_tools_racoon_daemon:0.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F785F17-6BE9-4014-9793-3D9ADC1DB15C"}, {"criteria": "cpe:2.3:a:linux:ipsec_tools_racoon_daemon:0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D334F8D-A40B-43F5-B8E8-FB6188C0ABC9"}, {"criteria": "cpe:2.3:a:linux:ipsec_tools_racoon_daemon:0.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "937B89D2-D73A-43A6-9278-5232EC59C7CD"}, {"criteria": "cpe:2.3:a:linux:ipsec_tools_racoon_daemon:0.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DC8E64E-8806-495A-8D20-4B3527F99F46"}, {"criteria": "cpe:2.3:a:linux:ipsec_tools_racoon_daemon:0.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1980469E-207B-46FA-B921-6D3A188E2C01"}, {"criteria": "cpe:2.3:a:linux:ipsec_tools_racoon_daemon:0.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6CD9290-6AA1-43B1-B903-BD8957DF37E9"}, {"criteria": "cpe:2.3:a:linux:ipsec_tools_racoon_daemon:0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DCA860C-0E18-4CEE-88D8-11C475FBB393"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}