First published: Thu Mar 23 2006(Updated: )
A "programming error" in fast_ipsec in FreeBSD 4.8-RELEASE through 6.1-STABLE and NetBSD 2 through 3 does not properly update the sequence number associated with a Security Association, which allows packets to pass sequence number checks and allows remote attackers to capture IPSec packets and conduct replay attacks.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =4.8-release_p7 | |
FreeBSD FreeBSD | =5.4-releng | |
FreeBSD FreeBSD | =5.3-release | |
FreeBSD FreeBSD | =5.1-releng | |
FreeBSD FreeBSD | =5.3 | |
FreeBSD FreeBSD | =5.1-release_p5 | |
FreeBSD FreeBSD | =5.2.1-releng | |
FreeBSD FreeBSD | =5.0-release_p14 | |
FreeBSD FreeBSD | =5.1-release | |
FreeBSD FreeBSD | =5.0-releng | |
FreeBSD FreeBSD | =5.1-alpha | |
FreeBSD FreeBSD | =4.10-releng | |
FreeBSD FreeBSD | =4.11-releng | |
FreeBSD FreeBSD | =4.10-release | |
FreeBSD FreeBSD | =4.9-releng | |
FreeBSD FreeBSD | =5.1 | |
FreeBSD FreeBSD | =4.9-pre-release | |
FreeBSD FreeBSD | =4.8-pre-release | |
FreeBSD FreeBSD | =5.4-stable | |
FreeBSD FreeBSD | =5.2 | |
FreeBSD FreeBSD | =4.11-release_p3 | |
FreeBSD FreeBSD | =4.10-release_p8 | |
FreeBSD FreeBSD | =4.8 | |
FreeBSD FreeBSD | =5.4-pre-release | |
FreeBSD FreeBSD | =6.0-release | |
FreeBSD FreeBSD | =4.10 | |
FreeBSD FreeBSD | =5.4-release | |
FreeBSD FreeBSD | =5.0-alpha | |
NetBSD NetBSD | =3.0 | |
FreeBSD FreeBSD | =5.2.1-release | |
FreeBSD FreeBSD | =4.8-releng | |
FreeBSD FreeBSD | =5.0 | |
NetBSD NetBSD | =2.0 | |
FreeBSD FreeBSD | =6.0-stable | |
FreeBSD FreeBSD | =5.3-stable | |
FreeBSD FreeBSD | =4.9 | |
FreeBSD FreeBSD | =5.3-releng | |
FreeBSD FreeBSD | =4.11-stable |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.