Robert Foggia
2016-10-13 16:43:56 UTC
Hello,
Please find attached a patched for an issue discovered in ipsec-tools affecting raccoon 0.8.2 and prior. Details about Remote un-authenticated denial of service finding is below:
Finding 1: Remote un-authenticated denial of service
Credit: Trustwave
The ipsec-tools racoon daemon contains a remotely exploitable computational complexity attack when parsing and storing isakmp fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending isakmp fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place.
The algorithm in question is a simple quadratic linked list walk and is in O(n(n+1)) hence O(n^2) for ânâ fragments received. Since the implementation fails to identify repeated fragment indices, a remote attacker can repeatedly specify the same index. Worst-case complexity is realized if fragments are sent in reverse order, for instance:
253, 252 ... 3, 2, 1, 255 (last fragment)
The absence of fragment index 254 is not an error as this ensures fragment reassembly is not possible.
After review, please provide feedback on the next steps to get this issue patched. Thanks!
Best regards,
Robert F.
Security Researcher, Intelligence Team, SpiderLabs
Trustwave | SMART SECURITY ON DEMAND
www.trustwave.com <http://www.trustwave.com/>
On Wed, 27 Jul 2016 16:09:04 +0000
more. However, there is active community using it on ipsec-tools-devel
mailing list. I suggest you post there first the patch if one exists,
or other details.
Thanks,
Timo
________________________________
This transmission may contain information that is privileged, confidential, and/or exempt from disclosure under applicable law. If you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution, or use of the information contained herein (including any reliance thereon) is strictly prohibited. If you received this transmission in error, please immediately contact the sender and destroy the material in its entirety, whether in electronic or hard copy format.
Please find attached a patched for an issue discovered in ipsec-tools affecting raccoon 0.8.2 and prior. Details about Remote un-authenticated denial of service finding is below:
Finding 1: Remote un-authenticated denial of service
Credit: Trustwave
The ipsec-tools racoon daemon contains a remotely exploitable computational complexity attack when parsing and storing isakmp fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending isakmp fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place.
The algorithm in question is a simple quadratic linked list walk and is in O(n(n+1)) hence O(n^2) for ânâ fragments received. Since the implementation fails to identify repeated fragment indices, a remote attacker can repeatedly specify the same index. Worst-case complexity is realized if fragments are sent in reverse order, for instance:
253, 252 ... 3, 2, 1, 255 (last fragment)
The absence of fragment index 254 is not an error as this ensures fragment reassembly is not possible.
After review, please provide feedback on the next steps to get this issue patched. Thanks!
Best regards,
Robert F.
Security Researcher, Intelligence Team, SpiderLabs
Trustwave | SMART SECURITY ON DEMAND
www.trustwave.com <http://www.trustwave.com/>
On Wed, 27 Jul 2016 16:09:04 +0000
In the interest of responsible disclosure, we are notifying you about
potential vulnerability we have discovered in IPSec-Tools. This
vulnerability allows the ability for a remote unauthenticated
attacker to perform a denial of service attack. Based on our
disclosure policy, we will release an advisory detailing these
finding(s) after 30 days if we do not receive a reply. Because of the
sensitive nature of this issue, we are unable to include the advisory
in this email. However, we'd be happy to send the full advisory to
you. Please let me know if you prefer for us to send it encrypted
with your PGP key, send it using our secure email system, or simply
using conventional email.
It seems no one is actively maintaining the upstream distribution anypotential vulnerability we have discovered in IPSec-Tools. This
vulnerability allows the ability for a remote unauthenticated
attacker to perform a denial of service attack. Based on our
disclosure policy, we will release an advisory detailing these
finding(s) after 30 days if we do not receive a reply. Because of the
sensitive nature of this issue, we are unable to include the advisory
in this email. However, we'd be happy to send the full advisory to
you. Please let me know if you prefer for us to send it encrypted
with your PGP key, send it using our secure email system, or simply
using conventional email.
more. However, there is active community using it on ipsec-tools-devel
mailing list. I suggest you post there first the patch if one exists,
or other details.
Thanks,
Timo
________________________________
This transmission may contain information that is privileged, confidential, and/or exempt from disclosure under applicable law. If you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution, or use of the information contained herein (including any reliance thereon) is strictly prohibited. If you received this transmission in error, please immediately contact the sender and destroy the material in its entirety, whether in electronic or hard copy format.