CVE-2005-2359

The AES-XCBC-MAC algorithm in IPsec in FreeBSD 5.3 and 5.4, when used for authentication without other encryption, uses a constant key instead of the one that was assigned by the system administrator, which can allow remote attackers to spoof packets to establish an IPsec session.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:59

Type Values Removed Values Added
References () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:19.ipsec.asc - () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:19.ipsec.asc -
References () http://secunia.com/advisories/16244/ - Patch, Vendor Advisory () http://secunia.com/advisories/16244/ - Patch, Vendor Advisory
References () http://securitytracker.com/id?1014586 - () http://securitytracker.com/id?1014586 -
References () http://www.securityfocus.com/bid/14394 - () http://www.securityfocus.com/bid/14394 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/21551 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/21551 -

Information

Published : 2005-08-05 04:00

Updated : 2024-11-20 23:59


NVD link : CVE-2005-2359

Mitre link : CVE-2005-2359

CVE.ORG link : CVE-2005-2359


JSON object : View

Products Affected

freebsd

  • freebsd