First published: Tue Dec 31 2002(Updated: )
SafeNet VPN client allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly involving buffer overflows using (1) a large Security Parameter Index (SPI) field, (2) a large number of payloads, or (3) a long payload.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SafeNet SoftRemote |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2225 is considered critical due to its ability to cause denial of service or potentially execute arbitrary code.
To fix CVE-2002-2225, users should upgrade to the latest version of the SafeNet SoftRemote VPN Client that contains the necessary security patches.
CVE-2002-2225 affects the SafeNet SoftRemote VPN Client.
CVE-2002-2225 can be exploited through crafted Internet Key Exchange (IKE) response packets, including manipulations of the Security Parameter Index (SPI) and payloads.
Yes, CVE-2002-2225 can be exploited remotely by attackers, leading to potential denial of service or remote code execution.