Vulnerabilities in the Internet Key Exchange Xauth Implementation