Vulnerability Details : CVE-2005-3671
The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2005-3671
Probability of exploitation activity in the next 30 days: 5.45%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 92 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-3671
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
References for CVE-2005-3671
-
http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html
-
http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en
Vendor Advisory
-
http://www.kb.cert.org/vuls/id/226364
Third Party Advisory;US Government Resource
-
http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/
Exploit
- http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml
-
http://www.openswan.org/niscc2/
Patch;Vendor Advisory
- http://jvn.jp/niscc/NISCC-273756/index.html
-
http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html
-
http://www.securityfocus.com/bid/15416
Patch
-
http://securitytracker.com/id?1015214
- http://www.novell.com/linux/security/advisories/2005_70_ipsec.html
- http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html
-
http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html
Products affected by CVE-2005-3671
- cpe:2.3:a:frees_wan:frees_wan:2.04:*:*:*:*:*:*:*
- cpe:2.3:a:openswan:openswan:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:openswan:openswan:2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:openswan:openswan:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:openswan:openswan:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:openswan:openswan:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:openswan:openswan:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:openswan:openswan:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*