SafeNet VPN client allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly involving buffer overflows using (1) a large Security Parameter Index (SPI) field, (2) a large number of payloads, or (3) a long payload.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/287771 | Patch US Government Resource |
http://www.kb.cert.org/vuls/id/AAMN-59VTUQ | |
http://www.safenet-inc.com/knowledgebase/read_item.asp?ID=375 | |
http://www.kb.cert.org/vuls/id/287771 | Patch US Government Resource |
http://www.kb.cert.org/vuls/id/AAMN-59VTUQ | |
http://www.safenet-inc.com/knowledgebase/read_item.asp?ID=375 |
Configurations
History
20 Nov 2024, 23:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/287771 - Patch, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/AAMN-59VTUQ - | |
References | () http://www.safenet-inc.com/knowledgebase/read_item.asp?ID=375 - |
Information
Published : 2002-12-31 05:00
Updated : 2024-11-20 23:43
NVD link : CVE-2002-2225
Mitre link : CVE-2002-2225
CVE.ORG link : CVE-2002-2225
JSON object : View
Products Affected
safenet
- softremote_vpn_client
CWE