### [CVE-2016-10396](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10396) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place. ### POC #### Reference - https://gnats.netbsd.org/cgi-bin/query-pr-single.pl?number=51682 - https://gnats.netbsd.org/cgi-bin/query-pr-single.pl?number=51682 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/andir/nixos-issue-db-example