CVE-2004-0607 (CNNVD-200412-046)
中文标题:
KAME Racoon IDE Daemon X.509不正确证书验证漏洞
英文标题:
The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL ...
漏洞描述
中文描述:
Racoon是KAME的IKE守护程序。 当协商IPSec连接时Racoon不正确验证X.509证书,远程攻击者可以利用这个漏洞伪造证书访问IPSec VPN。 racoon使用eay_check_x509cert()验证证书,其中eay_check_x509cert()函数设置了验证回调: static int cb_check_cert(ok, ctx) int ok; X509_STORE_CTX *ctx; { char buf[256]; int log_tag; if (!ok) { [..] switch (ctx->error) { case X509_V_ERR_CERT_HAS_EXPIRED: case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT: #if OPENSSL_VERSION_NUMBER >= 0x00905100L case X509_V_ERR_INVALID_CA: case X509_V_ERR_PATH_LENGTH_EXCEEDED: case X509_V_ERR_INVALID_PURPOSE: #endif ok = 1; log_tag = LLV_WARNING; break; default: log_tag = LLV_ERROR; } [..] } ERR_clear_error(); return ok; } 如果OpenSSL由于证书过期,不正确CA签名,自签名或证书链太长等问题产生错误,racoon会忽略这些错误并允许不正确验证使用,并授权访问建立链接。未授权用户可以伪造证书,连接IPSec VPNS。
英文描述:
The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote attackers to bypass authentication.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| ipsec-tools | ipsec-tools | 0.3 | - | - |
cpe:2.3:a:ipsec-tools:ipsec-tools:0.3:*:*:*:*:*:*:*
|
| ipsec-tools | ipsec-tools | 0.3.1 | - | - |
cpe:2.3:a:ipsec-tools:ipsec-tools:0.3.1:*:*:*:*:*:*:*
|
| ipsec-tools | ipsec-tools | 0.3.2 | - | - |
cpe:2.3:a:ipsec-tools:ipsec-tools:0.3.2:*:*:*:*:*:*:*
|
| ipsec-tools | ipsec-tools | 0.3_rc1 | - | - |
cpe:2.3:a:ipsec-tools:ipsec-tools:0.3_rc1:*:*:*:*:*:*:*
|
| ipsec-tools | ipsec-tools | 0.3_rc2 | - | - |
cpe:2.3:a:ipsec-tools:ipsec-tools:0.3_rc2:*:*:*:*:*:*:*
|
| ipsec-tools | ipsec-tools | 0.3_rc3 | - | - |
cpe:2.3:a:ipsec-tools:ipsec-tools:0.3_rc3:*:*:*:*:*:*:*
|
| ipsec-tools | ipsec-tools | 0.3_rc4 | - | - |
cpe:2.3:a:ipsec-tools:ipsec-tools:0.3_rc4:*:*:*:*:*:*:*
|
| ipsec-tools | ipsec-tools | 0.3_rc5 | - | - |
cpe:2.3:a:ipsec-tools:ipsec-tools:0.3_rc5:*:*:*:*:*:*:*
|
| kame | racoon | * | - | - |
cpe:2.3:a:kame:racoon:*:*:*:*:*:*:*:*
|
| kame | racoon | 2003-07-11 | - | - |
cpe:2.3:a:kame:racoon:2003-07-11:*:*:*:*:*:*:*
|
| kame | racoon | 2004-04-05 | - | - |
cpe:2.3:a:kame:racoon:2004-04-05:*:*:*:*:*:*:*
|
| kame | racoon | 2004-04-07b | - | - |
cpe:2.3:a:kame:racoon:2004-04-07b:*:*:*:*:*:*:*
|
| kame | racoon | 2004-05-03 | - | - |
cpe:2.3:a:kame:racoon:2004-05-03:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 3.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 3.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
AV:N/AC:L/Au:N/C:C/I:C/A:C
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2004-0607 |
2025-11-11 15:17:29 | 2025-11-11 07:32:21 |
| NVD | nvd_CVE-2004-0607 |
2025-11-11 14:50:55 | 2025-11-11 07:41:07 |
| CNNVD | cnnvd_CNNVD-200412-046 |
2025-11-11 15:08:44 | 2025-11-11 07:48:54 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200412-046
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 10.0
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 15
- data_sources: ['cve'] -> ['cve', 'nvd']