CVE-2005-3669
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/11/2005
Last modified:
03/04/2025
Description
Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in multiple Cisco products allow remote attackers to cause a denial of service (device reset) via certain malformed IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the Cisco advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firewall_services_module:1.1_\(3.005\):*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firewall_services_module:2.1_\(0.208\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.a:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.b:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.c:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.d:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.f:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.a:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.b:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://jvn.jp/niscc/NISCC-273756/index.html
- http://secunia.com/advisories/17553
- http://securitytracker.com/id?1015198=
- http://securitytracker.com/id?1015199=
- http://securitytracker.com/id?1015200=
- http://securitytracker.com/id?1015201=
- http://securitytracker.com/id?1015202=
- http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/
- http://www.kb.cert.org/vuls/id/226364
- http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en
- http://www.securityfocus.com/bid/15401
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5226
- http://jvn.jp/niscc/NISCC-273756/index.html
- http://secunia.com/advisories/17553
- http://securitytracker.com/id?1015198=
- http://securitytracker.com/id?1015199=
- http://securitytracker.com/id?1015200=
- http://securitytracker.com/id?1015201=
- http://securitytracker.com/id?1015202=
- http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/
- http://www.kb.cert.org/vuls/id/226364
- http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en
- http://www.securityfocus.com/bid/15401
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5226