racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
Configuration 10 (hide)
|
Configuration 11 (hide)
|
Configuration 12 (hide)
|
Configuration 13 (hide)
|
Configuration 14 (hide)
|
Configuration 15 (hide)
|
History
21 Nov 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159482.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159549.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/131992/IPsec-Tools-0.8.2-Denial-Of-Service.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2015/May/81 - Exploit, Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2015/May/83 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.debian.org/security/2015/dsa-3272 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/05/20/1 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/05/21/11 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/74739 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1032397 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2623-1 - Third Party Advisory | |
References | () https://support.f5.com/csp/article/K05013313 - Third Party Advisory | |
References | () https://www.altsci.com/ipsec/ipsec-tools-sa.html - Exploit, Third Party Advisory |
Information
Published : 2015-05-29 15:59
Updated : 2024-11-21 02:30
NVD link : CVE-2015-4047
Mitre link : CVE-2015-4047
CVE.ORG link : CVE-2015-4047
JSON object : View
Products Affected
f5
- big-ip_application_security_manager
- big-iq_security
- big-ip_global_traffic_manager
- big-ip_domain_name_system
- big-ip_link_controller
- big-iq_centralized_management
- big-ip_edge_gateway
- big-ip_wan_optimization_manager
- enterprise_manager
- big-ip_policy_enforcement_manager
- big-ip_analytics
- big-iq_cloud
- big-ip_application_acceleration_manager
- big-ip_webaccelerator
- big-iq_device
- big-iq_cloud_and_orchestration
- big-ip_local_traffic_manager
- big-iq_adc
- big-ip_advanced_firewall_manager
- big-ip_access_policy_manager
- big-ip_protocol_security_manager
debian
- debian_linux
canonical
- ubuntu_linux
ipsec-tools
- ipsec-tools
fedoraproject
- fedora
CWE
CWE-476
NULL Pointer Dereference