{"api_version":"1","generated_at":"2026-04-23T09:38:19+00:00","cve":"CVE-2005-3671","urls":{"html":"https://cve.report/CVE-2005-3671","api":"https://cve.report/api/cve/CVE-2005-3671.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2005-3671","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2005-3671"},"summary":{"title":"CVE-2005-3671","description":"The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.","state":"PUBLISHED","assigner":"mitre","published_at":"2005-11-18 21:03:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.8","severity":"","vector":"AV:N/AC:L/Au:N/C:N/I:N/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html","name":"http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://secunia.com/advisories/17581","name":"http://secunia.com/advisories/17581","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Openswan ISAKMP IKE Message Processing Denial of Service","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml","name":"http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Gentoo Linux Documentation\n--\n  Openswan, IPsec-Tools: Vulnerabilities in ISAKMP Protocol implementation","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://jvn.jp/niscc/NISCC-273756/index.html","name":"http://jvn.jp/niscc/NISCC-273756/index.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"NISCC-273756: ISAKMP プロトコルの実装に複数の脆弱性","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18115","name":"http://secunia.com/advisories/18115","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - SUSE update for ipsec-tools / freeswan / openswan","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/226364","name":"http://www.kb.cert.org/vuls/id/226364","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"],"title":"US-CERT Vulnerability Note VU#226364","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/15416","name":"http://www.securityfocus.com/bid/15416","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Openswan IKE Traffic Denial Of Service Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/advisories/17980","name":"http://secunia.com/advisories/17980","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Gentoo update for openswan / ipsec-tools","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html","name":"http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Neohapsis Archives - Bugtraq - #0161 - Re:  [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html","name":"http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[SECURITY] Fedora Core 4 Update: openswan-2.4.4-1.0.FC4.1","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openswan.org/niscc2/","name":"http://www.openswan.org/niscc2/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Openswan:","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://securitytracker.com/id?1015214","name":"http://securitytracker.com/id?1015214","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - Openswan IKE Processing Lets Remote Users Deny Service","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2005_70_ipsec.html","name":"http://www.novell.com/linux/security/advisories/2005_70_ipsec.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html","name":"http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[SECURITY] Fedora Core 3 Update: openswan-2.4.4-0.FC3.1","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en","name":"http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"application/pdf","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/","name":"http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/17680","name":"http://secunia.com/advisories/17680","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Fedora update for openswan","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2005-3671","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3671","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2005","cve_id":"3671","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"frees_wan","cpe5":"frees_wan","cpe6":"2.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3671","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openswan","cpe5":"openswan","cpe6":"2.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3671","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openswan","cpe5":"openswan","cpe6":"2.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3671","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openswan","cpe5":"openswan","cpe6":"2.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3671","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openswan","cpe5":"openswan","cpe6":"2.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3671","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openswan","cpe5":"openswan","cpe6":"2.1.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3671","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openswan","cpe5":"openswan","cpe6":"2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3671","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openswan","cpe5":"openswan","cpe6":"2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3671","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xelerance","cpe5":"openswan","cpe6":"2.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T23:17:23.402Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en"},{"name":"15416","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/15416"},{"name":"FEDORA-2005-1093","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html"},{"name":"1015214","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1015214"},{"name":"17581","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17581"},{"name":"20051214 Re:  [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://jvn.jp/niscc/NISCC-273756/index.html"},{"name":"20051213 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html"},{"name":"GLSA-200512-04","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/"},{"name":"VU#226364","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/226364"},{"name":"18115","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18115"},{"name":"17680","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17680"},{"name":"FEDORA-2005-1092","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.openswan.org/niscc2/"},{"name":"17980","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17980"},{"name":"SUSE-SA:2005:070","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2005_70_ipsec.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-11-17T00:00:00.000Z","descriptions":[{"lang":"en","value":"The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2005-11-24T10:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en"},{"name":"15416","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/15416"},{"name":"FEDORA-2005-1093","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html"},{"name":"1015214","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1015214"},{"name":"17581","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17581"},{"name":"20051214 Re:  [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html"},{"tags":["x_refsource_MISC"],"url":"http://jvn.jp/niscc/NISCC-273756/index.html"},{"name":"20051213 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html"},{"name":"GLSA-200512-04","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml"},{"tags":["x_refsource_MISC"],"url":"http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/"},{"name":"VU#226364","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/226364"},{"name":"18115","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18115"},{"name":"17680","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17680"},{"name":"FEDORA-2005-1092","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.openswan.org/niscc2/"},{"name":"17980","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17980"},{"name":"SUSE-SA:2005:070","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2005_70_ipsec.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2005-3671","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en","refsource":"MISC","url":"http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en"},{"name":"15416","refsource":"BID","url":"http://www.securityfocus.com/bid/15416"},{"name":"FEDORA-2005-1093","refsource":"FEDORA","url":"http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html"},{"name":"1015214","refsource":"SECTRACK","url":"http://securitytracker.com/id?1015214"},{"name":"17581","refsource":"SECUNIA","url":"http://secunia.com/advisories/17581"},{"name":"20051214 Re:  [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation","refsource":"BUGTRAQ","url":"http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html"},{"name":"http://jvn.jp/niscc/NISCC-273756/index.html","refsource":"MISC","url":"http://jvn.jp/niscc/NISCC-273756/index.html"},{"name":"20051213 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation","refsource":"BUGTRAQ","url":"http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html"},{"name":"GLSA-200512-04","refsource":"GENTOO","url":"http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml"},{"name":"http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/","refsource":"MISC","url":"http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/"},{"name":"VU#226364","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/226364"},{"name":"18115","refsource":"SECUNIA","url":"http://secunia.com/advisories/18115"},{"name":"17680","refsource":"SECUNIA","url":"http://secunia.com/advisories/17680"},{"name":"FEDORA-2005-1092","refsource":"FEDORA","url":"http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html"},{"name":"http://www.openswan.org/niscc2/","refsource":"CONFIRM","url":"http://www.openswan.org/niscc2/"},{"name":"17980","refsource":"SECUNIA","url":"http://secunia.com/advisories/17980"},{"name":"SUSE-SA:2005:070","refsource":"SUSE","url":"http://www.novell.com/linux/security/advisories/2005_70_ipsec.html"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2005-3671","datePublished":"2005-11-18T21:00:00.000Z","dateReserved":"2005-11-18T00:00:00.000Z","dateUpdated":"2024-08-07T23:17:23.402Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-11-18 21:03:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:frees_wan:frees_wan:2.04:*:*:*:*:*:*:*","matchCriteriaId":"68C84C1F-2804-4E5F-B34E-D75530CD5A71"},{"vulnerable":true,"criteria":"cpe:2.3:a:openswan:openswan:2.1.1:*:*:*:*:*:*:*","matchCriteriaId":"3A9EABDE-514F-42BA-A335-135209605981"},{"vulnerable":true,"criteria":"cpe:2.3:a:openswan:openswan:2.1.2:*:*:*:*:*:*:*","matchCriteriaId":"2425AF51-C42B-4EAA-A619-EE47EAFCBA83"},{"vulnerable":true,"criteria":"cpe:2.3:a:openswan:openswan:2.1.4:*:*:*:*:*:*:*","matchCriteriaId":"892D939B-4649-4B90-A2C0-6C2E4DDF7DFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:openswan:openswan:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"1A321B57-5E08-48C8-9288-A92342770FD1"},{"vulnerable":true,"criteria":"cpe:2.3:a:openswan:openswan:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"54780B50-9CFE-43B6-8BB9-C7246F817773"},{"vulnerable":true,"criteria":"cpe:2.3:a:openswan:openswan:2.2:*:*:*:*:*:*:*","matchCriteriaId":"001E2700-CE33-495A-8F8A-81E2E550CFF2"},{"vulnerable":true,"criteria":"cpe:2.3:a:openswan:openswan:2.3:*:*:*:*:*:*:*","matchCriteriaId":"6A628FE6-A042-4DF9-A141-8BE65FD236C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*","matchCriteriaId":"F7841F42-1226-43C4-A007-88847925D872"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2005","CveId":"3671","Ordinal":"1","Title":"CVE-2005-3671","CVE":"CVE-2005-3671","Year":"2005"},"notes":[{"CveYear":"2005","CveId":"3671","Ordinal":"1","NoteData":"The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.","Type":"Description","Title":"CVE-2005-3671"},{"CveYear":"2005","CveId":"3671","Ordinal":"2","NoteData":"2005-11-18","Type":"Other","Title":"Published"},{"CveYear":"2005","CveId":"3671","Ordinal":"3","NoteData":"2005-11-24","Type":"Other","Title":"Modified"}]}}}