First published: Thu Dec 29 2005(Updated: )
The Internet Key Exchange version 1 (IKEv1) implementations in Fortinet FortiOS 2.50, 2.80 and 3.0, FortiClient 2.0,; and FortiManager 2.80 and 3.0 allow remote attackers to cause a denial of service (termination of a process that is automatically restarted) via IKE packets with invalid values of certain IPSec attributes, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the vendor advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | =3.0 | |
Fortinet FortiOS IPS Engine | =2.50 | |
Fortinet FortiOS IPS Engine | =2.80 | |
Fortinet FortiClient Virtual Private Network | =2.0 | |
Fortinet FortiManager | =2.80 | |
Fortinet FortiManager | =3.0 | |
Fortinet FortiOS IPS Engine | =2.50 | |
Fortinet FortiOS IPS Engine | =2.80 | |
Fortinet FortiOS IPS Engine | =3.0 | |
Fortinet FortiClient Virtual Private Network | =2.0 | |
Fortinet FortiManager | =2.80 | |
Fortinet FortiManager | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4570 is classified as a denial of service vulnerability.
To mitigate CVE-2005-4570, you should upgrade to the latest version of Fortinet's FortiOS or FortiClient that addresses this vulnerability.
CVE-2005-4570 affects Fortinet FortiOS versions 2.50, 2.80, and 3.0, as well as FortiClient 2.0, FortiManager 2.80, and 3.0.
Yes, CVE-2005-4570 allows remote attackers to exploit the vulnerability through specially crafted IKE packets.
CVE-2005-4570 enables attackers to cause a denial of service by terminating processes that are automatically restarted.