First published: Mon Nov 21 2005(Updated: )
The Internet Key Exchange version 1 (IKEv1) implementation (isakmp_agg.c) in racoon in ipsec-tools before 0.6.3, when running in aggressive mode, allows remote attackers to cause a denial of service (null dereference and crash) via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ipsec-tools | =0.5 | |
Ipsec-tools | =0.5.2 | |
Ipsec-tools | =0.6.2 | |
Ipsec-tools | =0.6.1 | |
Ipsec-tools | =0.6 | |
Ipsec-tools | =0.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3732 is considered a moderate severity vulnerability as it can lead to denial of service.
To fix CVE-2005-3732, upgrade to ipsec-tools version 0.6.3 or later.
CVE-2005-3732 affects ipsec-tools versions 0.5, 0.5.1, 0.5.2, 0.6, 0.6.1, and 0.6.2.
Yes, CVE-2005-3732 can be exploited remotely through specially crafted IKE packets.
CVE-2005-3732 can cause a null dereference and crash the affected systems when exploited.