CVE-2005-3671
Gravedad CVSS v2.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
18/11/2005
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
Impacto
Puntuación base 2.0
7.80
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:frees_wan:frees_wan:2.04:*:*:*:*:*:*:* | ||
cpe:2.3:a:openswan:openswan:2.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:openswan:openswan:2.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:openswan:openswan:2.1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:openswan:openswan:2.1.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:openswan:openswan:2.1.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:openswan:openswan:2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:openswan:openswan:2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html
- http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html
- http://jvn.jp/niscc/NISCC-273756/index.html
- http://secunia.com/advisories/17581
- http://secunia.com/advisories/17680
- http://secunia.com/advisories/17980
- http://secunia.com/advisories/18115
- http://securitytracker.com/id?1015214=
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/
- http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml
- http://www.kb.cert.org/vuls/id/226364
- http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en
- http://www.novell.com/linux/security/advisories/2005_70_ipsec.html
- http://www.openswan.org/niscc2/
- http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html
- http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html
- http://www.securityfocus.com/bid/15416
- http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html
- http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html
- http://jvn.jp/niscc/NISCC-273756/index.html
- http://secunia.com/advisories/17581
- http://secunia.com/advisories/17680
- http://secunia.com/advisories/17980
- http://secunia.com/advisories/18115
- http://securitytracker.com/id?1015214=
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/
- http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml
- http://www.kb.cert.org/vuls/id/226364
- http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en
- http://www.novell.com/linux/security/advisories/2005_70_ipsec.html
- http://www.openswan.org/niscc2/
- http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html
- http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html
- http://www.securityfocus.com/bid/15416