CVE-2005-3671
Summary
| CVE | CVE-2005-3671 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-11-18 21:03:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. |
Risk And Classification
Primary CVSS: v2.0 7.8 from [email protected]
AV:N/AC:L/Au:N/C:N/I:N/A:C
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
NoneAvailability
CompleteAV:N/AC:L/Au:N/C:N/I:N/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Frees Wan | Frees Wan | 2.04 | All | All | All |
| Application | Openswan | Openswan | 2.1.1 | All | All | All |
| Application | Openswan | Openswan | 2.1.2 | All | All | All |
| Application | Openswan | Openswan | 2.1.4 | All | All | All |
| Application | Openswan | Openswan | 2.1.5 | All | All | All |
| Application | Openswan | Openswan | 2.1.6 | All | All | All |
| Application | Openswan | Openswan | 2.2 | All | All | All |
| Application | Openswan | Openswan | 2.3 | All | All | All |
| Application | Xelerance | Openswan | 2.4.0 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| archives.neohapsis.com/archives/bugtraq/2005-12/0138.html | af854a3a-2127-422b-91ae-364da2661108 | archives.neohapsis.com | |
| Secunia - Advisories - Openswan ISAKMP IKE Message Processing Denial of Service | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Gentoo Linux Documentation -- Openswan, IPsec-Tools: Vulnerabilities in ISAKMP Protocol implementation | af854a3a-2127-422b-91ae-364da2661108 | www.gentoo.org | |
| NISCC-273756: ISAKMP プロトコルの実装に複数の脆弱性 | af854a3a-2127-422b-91ae-364da2661108 | jvn.jp | |
| Secunia - Advisories - SUSE update for ipsec-tools / freeswan / openswan | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| US-CERT Vulnerability Note VU#226364 | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | Third Party Advisory, US Government Resource |
| Openswan IKE Traffic Denial Of Service Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Patch |
| Secunia - Advisories - Gentoo update for openswan / ipsec-tools | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Neohapsis Archives - Bugtraq - #0161 - Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation | af854a3a-2127-422b-91ae-364da2661108 | archives.neohapsis.com | |
| [SECURITY] Fedora Core 4 Update: openswan-2.4.4-1.0.FC4.1 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Openswan: | af854a3a-2127-422b-91ae-364da2661108 | www.openswan.org | Patch, Vendor Advisory |
| SecurityTracker.com Archives - Openswan IKE Processing Lets Remote Users Deny Service | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| Security Announcement | af854a3a-2127-422b-91ae-364da2661108 | www.novell.com | |
| [SECURITY] Fedora Core 3 Update: openswan-2.4.4-0.FC3.1 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf | af854a3a-2127-422b-91ae-364da2661108 | www.niscc.gov.uk | Vendor Advisory |
| www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp | af854a3a-2127-422b-91ae-364da2661108 | www.ee.oulu.fi | Exploit |
| Secunia - Advisories - Fedora update for openswan | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.