IPSecDrv.sys 10.4.0.12 in SafeNET High Assurance Remote 1.4.0 Build 12, and SoftRemote, allows remote attackers to cause a denial of service (infinite loop and system hang) via an invalid packet with certain bytes in an option header, possibly related to the IPv6 support for IPSec.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063859.html - Exploit | |
References | () http://osvdb.org/37137 - | |
References | () http://secunia.com/advisories/25574 - | |
References | () http://securityreason.com/securityalert/2803 - | |
References | () http://www.digit-labs.org/files/exploits/safenet-dos.c - Exploit | |
References | () http://www.securityfocus.com/bid/24385 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/34775 - |
Information
Published : 2007-06-11 22:30
Updated : 2024-11-21 00:32
NVD link : CVE-2007-3157
Mitre link : CVE-2007-3157
CVE.ORG link : CVE-2007-3157
JSON object : View
Products Affected
safenet
- softremote_vpn_client
- safenet_highassurance_remote
CWE