Vulnerability Note VU#552398

KAME Racoon IKE daemon fails to properly verify client RSA signatures

Original Release date: 09 Apr 2004 | Last revised: 09 Apr 2004


The KAME Racoon IKE daemon fails to properly verify client RSA signatures when using Main or Aggressive Mode during a Phase 1 IKE exchange.


Racoon is an IKE Key Management daemon that negotiates and configures a set of parameters for IPSec. When authenticating a peer in Phase 1 of an IKE exchange, Racoon can use pre-shared keys, RSA signatures, or GSS-API. When using RSA signatures for authentication, Racoon validates the X.509 certificate, but fails to verify the client RSA signature.


An attacker with access to a trusted X.509 certificate can conduct a man-in-the-middle attack or establish an authenticated IPSec connection using any private key to generate the RSA signature.


Apply Patch

Apply a patch as specified by your vendor. If a patch is unavailable, KAME has released a patch that is available in their CVS repository at:

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
KAME ProjectAffected-09 Apr 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported by Ralf Spenneberg.

This document was written by Damon Morda.

Other Information

  • CVE IDs: CAN-2004-0155
  • Date Public: 07 Apr 2004
  • Date First Published: 09 Apr 2004
  • Date Last Updated: 09 Apr 2004
  • Severity Metric: 8.58
  • Document Revision: 25


If you have feedback, comments, or additional information about this vulnerability, please send us email.