Overview
The KAME Racoon IKE daemon fails to properly verify client RSA signatures when using Main or Aggressive Mode during a Phase 1 IKE exchange.
Description
| Racoon is an IKE Key Management daemon that negotiates and configures a set of parameters for IPSec. When authenticating a peer in Phase 1 of an IKE exchange, Racoon can use pre-shared keys, RSA signatures, or GSS-API. When using RSA signatures for authentication, Racoon validates the X.509 certificate, but fails to verify the client RSA signature. | 
Impact
| An attacker with access to a trusted X.509 certificate can conduct a man-in-the-middle attack or establish an authenticated IPSec connection using any private key to generate the RSA signature. | 
Solution
| Apply Patch Apply a patch as specified by your vendor. If a patch is unavailable, KAME has released a patch that is available in their CVS repository at: | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
- http://ipsec-tools.sourceforge.net/x509sig.html
- http://www.kame.net/racoon/
- http://www.kame.net/dev/cvsweb2.cgi/kame/kame/kame/racoon/crypto_openssl.c.diff?r1=1.83&r2=1.84
- http://vuxml.freebsd.org/d8769838-8814-11d8-90d1-0020ed76ef5a.html
- http://secunia.com/advisories/11328/
- http://forums.gentoo.org/viewtopic.php?t=158550
Acknowledgements
This vulnerability was reported by Ralf Spenneberg.
This document was written by Damon Morda.
Other Information
| CVE IDs: | CVE-2004-0155 | 
| Severity Metric: | 8.58 | 
| Date Public: | 2004-04-07 | 
| Date First Published: | 2004-04-09 | 
| Date Last Updated: | 2004-04-09 20:43 UTC | 
| Document Revision: | 27 |