CVE-2005-0398

The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets.
References
Link Resource
http://secunia.com/advisories/14584 Patch Vendor Advisory
http://security.gentoo.org/glsa/glsa-200503-33.xml Patch Vendor Advisory
http://securitytracker.com/id?1013433 Patch Vendor Advisory
http://sourceforge.net/mailarchive/forum.php?thread_id=6787713&forum_id=32000 Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:062
http://www.redhat.com/support/errata/RHSA-2005-232.html Patch Vendor Advisory
http://www.securityfocus.com/bid/12804 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2005/0264
https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=109966&action=view Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/19707
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10028
http://secunia.com/advisories/14584 Patch Vendor Advisory
http://security.gentoo.org/glsa/glsa-200503-33.xml Patch Vendor Advisory
http://securitytracker.com/id?1013433 Patch Vendor Advisory
http://sourceforge.net/mailarchive/forum.php?thread_id=6787713&forum_id=32000 Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:062
http://www.redhat.com/support/errata/RHSA-2005-232.html Patch Vendor Advisory
http://www.securityfocus.com/bid/12804 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2005/0264
https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=109966&action=view Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/19707
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10028
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ipsec-tools:ipsec-tools:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:ipsec-tools:ipsec-tools:0.5:*:*:*:*:*:*:*
cpe:2.3:a:kame:racoon:2003-07-11:*:*:*:*:*:*:*
cpe:2.3:a:kame:racoon:2004-04-05:*:*:*:*:*:*:*
cpe:2.3:a:kame:racoon:2004-04-07b:*:*:*:*:*:*:*
cpe:2.3:a:kame:racoon:2004-05-03:*:*:*:*:*:*:*
cpe:2.3:a:kame:racoon:2005-01-03:*:*:*:*:*:*:*
cpe:2.3:a:kame:racoon:2005-01-10:*:*:*:*:*:*:*
cpe:2.3:a:kame:racoon:2005-01-17:*:*:*:*:*:*:*
cpe:2.3:a:kame:racoon:2005-01-24:*:*:*:*:*:*:*
cpe:2.3:a:kame:racoon:2005-01-31:*:*:*:*:*:*:*
cpe:2.3:a:kame:racoon:2005-02-07:*:*:*:*:*:*:*
cpe:2.3:a:kame:racoon:2005-02-14:*:*:*:*:*:*:*
cpe:2.3:a:kame:racoon:2005-02-21:*:*:*:*:*:*:*
cpe:2.3:a:kame:racoon:2005-02-28:*:*:*:*:*:*:*
cpe:2.3:a:kame:racoon:2005-03-07:*:*:*:*:*:*:*
cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:altlinux:alt_linux:2.3:*:compact:*:*:*:*:*
cpe:2.3:o:altlinux:alt_linux:2.3:*:junior:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:*:*:desktop:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:*:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*

History

20 Nov 2024, 23:55

Type Values Removed Values Added
References () http://secunia.com/advisories/14584 - Patch, Vendor Advisory () http://secunia.com/advisories/14584 - Patch, Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200503-33.xml - Patch, Vendor Advisory () http://security.gentoo.org/glsa/glsa-200503-33.xml - Patch, Vendor Advisory
References () http://securitytracker.com/id?1013433 - Patch, Vendor Advisory () http://securitytracker.com/id?1013433 - Patch, Vendor Advisory
References () http://sourceforge.net/mailarchive/forum.php?thread_id=6787713&forum_id=32000 - Patch, Vendor Advisory () http://sourceforge.net/mailarchive/forum.php?thread_id=6787713&forum_id=32000 - Patch, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:062 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:062 -
References () http://www.redhat.com/support/errata/RHSA-2005-232.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-232.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/12804 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/12804 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2005/0264 - () http://www.vupen.com/english/advisories/2005/0264 -
References () https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=109966&action=view - Patch, Vendor Advisory () https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=109966&action=view - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19707 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/19707 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10028 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10028 -

Information

Published : 2005-03-14 05:00

Updated : 2024-11-20 23:55


NVD link : CVE-2005-0398

Mitre link : CVE-2005-0398

CVE.ORG link : CVE-2005-0398


JSON object : View

Products Affected

sgi

  • propack

redhat

  • enterprise_linux
  • enterprise_linux_desktop

kame

  • racoon

suse

  • suse_linux

ipsec-tools

  • ipsec-tools

altlinux

  • alt_linux