CVE-2005-3671

The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html
http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html
http://jvn.jp/niscc/NISCC-273756/index.html
http://secunia.com/advisories/17581
http://secunia.com/advisories/17680
http://secunia.com/advisories/17980
http://secunia.com/advisories/18115
http://securitytracker.com/id?1015214
http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/ Exploit
http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml
http://www.kb.cert.org/vuls/id/226364 Third Party Advisory US Government Resource
http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_70_ipsec.html
http://www.openswan.org/niscc2/ Patch Vendor Advisory
http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html
http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html
http://www.securityfocus.com/bid/15416 Patch
http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html
http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html
http://jvn.jp/niscc/NISCC-273756/index.html
http://secunia.com/advisories/17581
http://secunia.com/advisories/17680
http://secunia.com/advisories/17980
http://secunia.com/advisories/18115
http://securitytracker.com/id?1015214
http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/ Exploit
http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml
http://www.kb.cert.org/vuls/id/226364 Third Party Advisory US Government Resource
http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_70_ipsec.html
http://www.openswan.org/niscc2/ Patch Vendor Advisory
http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html
http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html
http://www.securityfocus.com/bid/15416 Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:frees_wan:frees_wan:2.04:*:*:*:*:*:*:*
cpe:2.3:a:openswan:openswan:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openswan:openswan:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openswan:openswan:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:openswan:openswan:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:openswan:openswan:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:openswan:openswan:2.2:*:*:*:*:*:*:*
cpe:2.3:a:openswan:openswan:2.3:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:02

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html - () http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html -
References () http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html - () http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html -
References () http://jvn.jp/niscc/NISCC-273756/index.html - () http://jvn.jp/niscc/NISCC-273756/index.html -
References () http://secunia.com/advisories/17581 - () http://secunia.com/advisories/17581 -
References () http://secunia.com/advisories/17680 - () http://secunia.com/advisories/17680 -
References () http://secunia.com/advisories/17980 - () http://secunia.com/advisories/17980 -
References () http://secunia.com/advisories/18115 - () http://secunia.com/advisories/18115 -
References () http://securitytracker.com/id?1015214 - () http://securitytracker.com/id?1015214 -
References () http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/ - Exploit () http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/ - Exploit
References () http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml - () http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml -
References () http://www.kb.cert.org/vuls/id/226364 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/226364 - Third Party Advisory, US Government Resource
References () http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en - Vendor Advisory () http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en - Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2005_70_ipsec.html - () http://www.novell.com/linux/security/advisories/2005_70_ipsec.html -
References () http://www.openswan.org/niscc2/ - Patch, Vendor Advisory () http://www.openswan.org/niscc2/ - Patch, Vendor Advisory
References () http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html - () http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html -
References () http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html - () http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html -
References () http://www.securityfocus.com/bid/15416 - Patch () http://www.securityfocus.com/bid/15416 - Patch

Information

Published : 2005-11-18 21:03

Updated : 2024-11-21 00:02


NVD link : CVE-2005-3671

Mitre link : CVE-2005-3671

CVE.ORG link : CVE-2005-3671


JSON object : View

Products Affected

xelerance

  • openswan

openswan

  • openswan

frees_wan

  • frees_wan