First published: Fri Nov 18 2005(Updated: )
The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Farmers Wife | =2.04 | |
Xelerance Openswan | =2.1.1 | |
Xelerance Openswan | =2.1.2 | |
Xelerance Openswan | =2.1.4 | |
Xelerance Openswan | =2.1.5 | |
Xelerance Openswan | =2.1.6 | |
Xelerance Openswan | =2.2 | |
Xelerance Openswan | =2.3 | |
Openswan | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3671 has a severity rating that indicates it can lead to denial of service attacks.
To fix CVE-2005-3671, upgrade Openswan or FreeSwan to versions 2.4.4 or later.
CVE-2005-3671 affects specific versions of Openswan prior to 2.4.4 and FreeSwan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23.
CVE-2005-3671 enables remote attackers to exploit a denial of service vulnerability.
The vulnerability in CVE-2005-3671 is caused by the IKEv1 implementation accepting crafted packets with invalid key lengths.