IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors.
References
Link | Resource |
---|---|
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-016.txt.asc | |
http://razor.bindview.com/publish/advisories/adv_ipsec.html | Vendor Advisory |
http://www.debian.org/security/2002/dsa-201 | |
http://www.iss.net/security_center/static/10411.php | Vendor Advisory |
http://www.kb.cert.org/vuls/id/459371 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/6011 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2002-11-04 05:00
Updated : 2008-09-10 19:12
NVD link : CVE-2002-0666
Mitre link : CVE-2002-0666
CVE.ORG link : CVE-2002-0666
JSON object : View
Products Affected
nec
- ix2010
- ix1050
- bluefire_ix1035_router
- ix1010
- ix1011
- ix1020
freebsd
- freebsd
apple
- mac_os_x
- mac_os_x_server
frees_wan
- frees_wan
global_technology_associates
- gnat_box_firmware
netbsd
- netbsd
CWE