First published: Thu Dec 29 2005(Updated: )
The Internet Key Exchange version 1 (IKEv1) implementations in Fortinet FortiOS 2.50, 2.80 and 3.0, FortiClient 2.0,; and FortiManager 2.80 and 3.0 allow remote attackers to cause a denial of service (termination of a process that is automatically restarted) via IKE packets with invalid values of certain IPSec attributes, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the vendor advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | =3.0 | |
Fortinet FortiOS | =2.50 | |
Fortinet FortiOS | =2.80 | |
Fortinet Forticlient | =2.0 | |
Fortinet FortiManager | =2.80 | |
Fortinet FortiManager | =3.0 | |
Fortinet FortiOS | =2.50 | |
Fortinet FortiOS | =2.80 | |
Fortinet FortiOS | =3.0 | |
Fortinet Forticlient | =2.0 | |
Fortinet FortiManager | =2.80 | |
Fortinet FortiManager | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.