First published: Wed Apr 22 2009(Updated: )
racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ipsec-tools | <0:0.6.5-13.el5_3.1 | 0:0.6.5-13.el5_3.1 |
Ipsec-tools | =0.2.4 | |
Ipsec-tools | =0.4-rc1 | |
Ipsec-tools | =0.5 | |
Ipsec-tools | =0.3-rc3 | |
Ipsec-tools | =0.3-rc5 | |
Ipsec-tools | =0.6.2 | |
Ipsec-tools | =0.6.5 | |
Ipsec-tools | =0.3.2 | |
Ipsec-tools | =0.7 | |
Ipsec-tools | =0.6.1 | |
Ipsec-tools | =0.6.3 | |
Ipsec-tools | =0.3.3 | |
Ipsec-tools | =0.2 | |
Ipsec-tools | =0.3.1 | |
Ipsec-tools | =0.3-rc2 | |
Ipsec-tools | =0.2.1 | |
Ipsec-tools | =0.3-rc4 | |
Ipsec-tools | =0.2.2 | |
Ipsec-tools | =0.2.3 | |
Ipsec-tools | =0.4 | |
Ipsec-tools | =0.1 | |
Ipsec-tools | =0.6.4 | |
Ipsec-tools | <=0.7.1 | |
Ipsec-tools | =0.3 | |
Ipsec-tools | =0.3-rc1 | |
Ipsec-tools | =0.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1574 has a severity level that is categorized as a denial of service vulnerability that can lead to application crashes.
To fix CVE-2009-1574, update ipsec-tools to version 0.7.2 or higher.
CVE-2009-1574 affects various versions of ipsec-tools prior to 0.7.2, including 0.2.4 and 0.6.5.
CVE-2009-1574 is a denial of service vulnerability that can be exploited via crafted fragmented packets.
A recommended workaround for CVE-2009-1574 is to implement firewall rules that drop unknown or malformed packets until a fix is applied.