CVE-2008-1198
Summary
| CVE | CVE-2008-1198 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2008-03-06 21:44:00 UTC |
| Updated | 2022-02-03 19:56:00 UTC |
| Description | The default IPSec ifup script in Red Hat Enterprise Linux 3 through 5 configures racoon to use aggressive IKE mode instead of main IKE mode, which makes it easier for remote attackers to conduct brute force attacks by sniffing an unencrypted preshared key (PSK) hash. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Redhat | Enterprise Linux | 4.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 3.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 5.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 3.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 5.0 | All | All | All |
| Application | Red Hat | Enterprise Linux | 4 | All | All | All |
| Application | Red Hat | Enterprise Linux | 4 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Security Alerts - Secunia | SECUNIA | secunia.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| www.ernw.de/download/pskattack.pdf | MISC | www.ernw.de | Exploit |
| Bug 435274 – CVE-2008-1198 IPSec ifup script allows for aggressive IKE mode | CONFIRM | bugzilla.redhat.com | |
| Red Hat Enterprise Linux Default IPSec Script Uses IKE Aggressive Mode - SecurityTracker | SECTRACK | www.securitytracker.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2008-03-07 | Mark J Cox | Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1198 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. |
There are currently no legacy QID mappings associated with this CVE.