First published: Fri May 29 2015(Updated: )
racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipsec-tools | =0.8.2 | |
Ubuntu Linux | =12.04 | |
Fedora | =20 | |
Fedora | =21 | |
F5 BIG-IP Application Acceleration Manager | >=11.4.0<=11.6.4 | |
F5 BIG-IP Application Acceleration Manager | >=12.0.0<=12.1.4 | |
F5 BIG-IP Application Acceleration Manager | =13.0.0 | |
Riverbed SteelApp Traffic Manager | >=11.0.0<=11.6.4 | |
Riverbed SteelApp Traffic Manager | >=12.0.0<=12.1.4 | |
Riverbed SteelApp Traffic Manager | =13.0.0 | |
F5 BIG-IP Advanced Firewall Manager | >=11.3.0<=11.6.4 | |
F5 BIG-IP Advanced Firewall Manager | >=12.0.0<=12.1.4 | |
F5 BIG-IP Advanced Firewall Manager | =13.0.0 | |
F5 BIG-IP Analytics | >=11.0.0<=11.6.4 | |
F5 BIG-IP Analytics | >=12.0.0<=12.1.4 | |
F5 BIG-IP Analytics | =13.0.0 | |
F5 Access Policy Manager | >=11.0.0<=11.6.4 | |
F5 Access Policy Manager | >=12.0.0<=12.1.4 | |
F5 Access Policy Manager | =13.0.0 | |
F5 Application Security Manager | >=11.0.0<=11.6.4 | |
F5 Application Security Manager | >=12.0.0<=12.1.4 | |
F5 Application Security Manager | =13.0.0 | |
F5 BIG-IP | >=12.0.0<=12.1.4 | |
F5 BIG-IP | =13.0.0 | |
F5 BIG-IP Edge Gateway | >=11.0.0<=11.3.0 | |
Riverbed SteelApp Traffic Manager | >=11.0.0<=11.6.4 | |
F5 BIG-IP Link Controller | >=11.0.0<=11.6.4 | |
F5 BIG-IP Link Controller | >=12.0.0<=12.1.4 | |
F5 BIG-IP Link Controller | =13.0.0 | |
F5 BIG-IP Policy Enforcement Manager | >=11.3.0<=11.6.4 | |
F5 BIG-IP Policy Enforcement Manager | >=12.0.0<=12.1.4 | |
F5 BIG-IP Policy Enforcement Manager | =13.0.0 | |
F5 BIG-IP Protocol Security Manager | >=11.0.0<=11.4.1 | |
F5 BIG-IP WAN Optimization Manager | >=11.0.0<=11.3.0 | |
F5 BIG-IP WebAccelerator | >=11.0.0<=11.3.0 | |
F5 BIG-IQ Application Delivery Controller | =4.5.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | =4.6.0 | |
F5 BIG-IQ Cloud and Orchestration | >=4.0.0<=4.5.0 | |
F5 BIG-IQ Cloud and Orchestration | =1.0.0 | |
F5 BIG-IQ Device | >=4.2.0<=4.5.0 | |
F5 BIG-IQ Security | >=4.0.0<=4.5.0 | |
F5 Enterprise Manager | >=3.0.0<=3.1.1 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4047 has a high severity rating due to its potential to cause a denial of service through a NULL pointer dereference and crash of the IKE daemon.
To fix CVE-2015-4047, update your IPsec-Tools to a version later than 0.8.2 that addresses this vulnerability.
CVE-2015-4047 affects IPsec-Tools version 0.8.2 and several versions of F5 BIG-IP products, Ubuntu Linux 12.04, and various Debian releases.
Yes, CVE-2015-4047 can be exploited by remote attackers through a series of crafted UDP requests.
If affected by CVE-2015-4047, your system may experience crashes of the IKE daemon, leading to service disruption.