The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote attackers to bypass authentication.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Ipsec-tools | Ipsec-tools | 0.3 (including) | 0.3 (including) |
| Ipsec-tools | Ipsec-tools | 0.3.1 (including) | 0.3.1 (including) |
| Ipsec-tools | Ipsec-tools | 0.3.2 (including) | 0.3.2 (including) |
| Ipsec-tools | Ipsec-tools | 0.3_rc1 (including) | 0.3_rc1 (including) |
| Ipsec-tools | Ipsec-tools | 0.3_rc2 (including) | 0.3_rc2 (including) |
| Ipsec-tools | Ipsec-tools | 0.3_rc3 (including) | 0.3_rc3 (including) |
| Ipsec-tools | Ipsec-tools | 0.3_rc4 (including) | 0.3_rc4 (including) |
| Ipsec-tools | Ipsec-tools | 0.3_rc5 (including) | 0.3_rc5 (including) |
| Racoon | Kame | * | * |
| Racoon | Kame | 2003-07-11 (including) | 2003-07-11 (including) |
| Racoon | Kame | 2004-04-05 (including) | 2004-04-05 (including) |
| Racoon | Kame | 2004-04-07b (including) | 2004-04-07b (including) |
| Racoon | Kame | 2004-05-03 (including) | 2004-05-03 (including) |
| Red Hat Enterprise Linux 3 | RedHat | ipsec-tools-0:0.2.5-0.5 | * |