IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors.
References
Link | Resource |
---|---|
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-016.txt.asc | |
http://razor.bindview.com/publish/advisories/adv_ipsec.html | Vendor Advisory |
http://www.debian.org/security/2002/dsa-201 | |
http://www.iss.net/security_center/static/10411.php | Vendor Advisory |
http://www.kb.cert.org/vuls/id/459371 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/6011 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2002-11-04 05:00
Updated : 2024-02-28 10:24
NVD link : CVE-2002-0666
Mitre link : CVE-2002-0666
CVE.ORG link : CVE-2002-0666
JSON object : View
Products Affected
nec
- ix1020
- ix1050
- ix1010
- bluefire_ix1035_router
- ix1011
- ix2010
apple
- mac_os_x
- mac_os_x_server
freebsd
- freebsd
global_technology_associates
- gnat_box_firmware
frees_wan
- frees_wan
netbsd
- netbsd
CWE