First published: Mon Nov 21 2005(Updated: )
The Internet Key Exchange version 1 (IKEv1) implementation in Juniper JUNOS and JUNOSe software for M, T, and J-series routers before release 6.4, and E-series routers before 7-1-0, allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos M | <=6.3 | |
Juniper Junos J | <=6.3 | |
Juniper Junose M | <=6.3.0 | |
Juniper Junos T | <=6.3 | |
Juniper Junose E | <=7.0.0 | |
Juniper Junos E | <=7.0.0 | |
Juniper Junose J | <=6.3 | |
Juniper Junose T | <=6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3733 is classified as a critical vulnerability due to its potential to cause denial of service and execute arbitrary code.
To fix CVE-2005-3733, upgrade to Juniper JUNOS version 6.4 or later, or E-series routers version 7.1.0 or later.
CVE-2005-3733 affects Juniper JUNOS and JUNOSe software for M, T, J-series routers before version 6.4 and E-series routers before version 7.1.0.
Yes, CVE-2005-3733 can be exploited remotely by sending crafted IKE packets to vulnerable Juniper devices.
The potential impacts of CVE-2005-3733 include denial of service and possibly arbitrary code execution on affected devices.