IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors.
References
Link | Resource |
---|---|
http://razor.bindview.com/publish/advisories/adv_ipsec.html | Vendor Advisory |
http://www.kb.cert.org/vuls/id/459371 | Third Party Advisory US Government Resource |
http://www.iss.net/security_center/static/10411.php | Vendor Advisory |
http://www.debian.org/security/2002/dsa-201 | |
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-016.txt.asc | |
http://www.securityfocus.com/bid/6011 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2002-11-03 21:00
Updated : 2008-09-10 12:12
NVD link : CVE-2002-0666
Mitre link : CVE-2002-0666
JSON object : View
CWE
Products Affected
apple
- mac_os_x_server
- mac_os_x
nec
- ix1011
- bluefire_ix1035_router
- ix2010
- ix1010
- ix1020
- ix1050
netbsd
- netbsd
frees_wan
- frees_wan
freebsd
- freebsd
global_technology_associates
- gnat_box_firmware