Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2005-0398
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- Partial
- Integrity Impact
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:kame:racoon:2005-02-14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:kame:racoon:2005-02-28:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ipsec-tools:ipsec-tools:0.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:kame:racoon:2004-04-05:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:kame:racoon:2005-01-31:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:ipsec-tools:ipsec-tools:0.3.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:kame:racoon:2003-07-11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:kame:racoon:2005-01-03:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:kame:racoon:2005-02-21:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:kame:racoon:2005-01-10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:kame:racoon:2004-05-03:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:kame:racoon:2004-04-07b:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:kame:racoon:2005-01-24:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:kame:racoon:2005-02-07:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:kame:racoon:2005-03-07:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:kame:racoon:2005-01-17:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*: |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*: |
Yes
|
- | - | |
cpe:2.3:o:altlinux:alt_linux:2.3:*:compact:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:*:*:desktop:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*: |
Yes
|
- | - | |
cpe:2.3:o:altlinux:alt_linux:2.3:*:junior:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*: |
Yes
|
- | - | |
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:*:*:enterprise_server:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:* |
Yes
|
- | - |
References
- http://sourceforge.net/mailarchive/forum.php?thread_id=6787713&forum_id=32000
- http://security.gentoo.org/glsa/glsa-200503-33.xml
- http://www.redhat.com/support/errata/RHSA-2005-232.html
- https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=109966&action=view
- http://securitytracker.com/id?1013433
- http://www.securityfocus.com/bid/12804
- http://secunia.com/advisories/14584
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:062
- http://www.vupen.com/english/advisories/2005/0264
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19707
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1