CVE-2005-3669
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
18/11/2005
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in multiple Cisco products allow remote attackers to cause a denial of service (device reset) via certain malformed IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the Cisco advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firewall_services_module:1.1_\(3.005\):*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firewall_services_module:2.1_\(0.208\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.a:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.b:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.c:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.d:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.f:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.a:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.b:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.4:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://jvn.jp/niscc/NISCC-273756/index.html
- http://secunia.com/advisories/17553
- http://securitytracker.com/id?1015198=
- http://securitytracker.com/id?1015199=
- http://securitytracker.com/id?1015200=
- http://securitytracker.com/id?1015201=
- http://securitytracker.com/id?1015202=
- http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/
- http://www.kb.cert.org/vuls/id/226364
- http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en
- http://www.securityfocus.com/bid/15401
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5226
- http://jvn.jp/niscc/NISCC-273756/index.html
- http://secunia.com/advisories/17553
- http://securitytracker.com/id?1015198=
- http://securitytracker.com/id?1015199=
- http://securitytracker.com/id?1015200=
- http://securitytracker.com/id?1015201=
- http://securitytracker.com/id?1015202=
- http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/
- http://www.kb.cert.org/vuls/id/226364
- http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en
- http://www.securityfocus.com/bid/15401
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5226