First published: Fri Nov 18 2005(Updated: )
The Internet Key Exchange version 1 (IKEv1) implementation in Check Point products allows remote attackers to cause a denial of service via certain crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point | ||
Check Point VPN-1 Firewall-1 Next Generation | =r55p | |
Check Point FireWall-1 | =3.0 | |
Check Point VPN-1 Firewall-1 Next Generation | =r55 | |
Check Point VPN-1 | =ngx_r60 | |
Checkpoint Express | =ci_r57 | |
Check Point VPN-1 Firewall-1 Next Generation | =r54 | |
Check Point VPN-1 Firewall-1 Next Generation | =r55w |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3673 has been classified as a denial of service vulnerability affecting specific Check Point products.
To mitigate CVE-2005-3673, it is recommended to update to the latest version of affected Check Point software.
CVE-2005-3673 impacts several Check Point products, including VPN-1 and FireWall-1 across various versions.
CVE-2005-3673 exploits vulnerabilities in the Internet Key Exchange version 1 implementation in Check Point devices.
Yes, CVE-2005-3673 can be exploited remotely through crafted IKE packets.