CVE-2002-0666

Current Description

IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors.

Basic Data

PublishedNovember 04, 2002
Last ModifiedSeptember 10, 2008
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationFrees WanFrees Wan1.9*******
    2.3ApplicationFrees WanFrees Wan1.9.1*******
    2.3ApplicationFrees WanFrees Wan1.9.2*******
    2.3ApplicationFrees WanFrees Wan1.9.3*******
    2.3ApplicationFrees WanFrees Wan1.9.4*******
    2.3ApplicationFrees WanFrees Wan1.9.5*******
    2.3ApplicationFrees WanFrees Wan1.9.6*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSAppleMac Os X10.2*******
    2.3OSAppleMac Os X Server10.2*******
    2.3OSFreebsdFreebsd4.6*******
    2.3OSFreebsdFreebsd4.6release******
    2.3OSFreebsdFreebsd4.6stable******
    2.3OSNetbsdNetbsd1.5*******
    2.3OSNetbsdNetbsd1.5*sh3*****
    2.3OSNetbsdNetbsd1.5*x86*****
    2.3OSNetbsdNetbsd1.5.1*******
    2.3OSNetbsdNetbsd1.5.2*******
    2.3OSNetbsdNetbsd1.5.3*******
    2.3OSNetbsdNetbsd1.6beta******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3HardwareGlobal Technology AssociatesGnat Box Firmware3.1*******
    2.3HardwareGlobal Technology AssociatesGnat Box Firmware3.2*******
    2.3HardwareGlobal Technology AssociatesGnat Box Firmware3.3*******
    2.3HardwareNecBluefire Ix1035 Router********
    2.3HardwareNecIx1010********
    2.3HardwareNecIx1011********
    2.3HardwareNecIx1020********
    2.3HardwareNecIx1050********
    2.3HardwareNecIx2010********

Vulnerable Software List

VendorProductVersions
Apple Mac Os X Server 10.2
Apple Mac Os X 10.2
Freebsd Freebsd 4.6
Nec Ix1050 *
Nec Ix2010 *
Nec Bluefire Ix1035 Router *
Nec Ix1010 *
Nec Ix1011 *
Nec Ix1020 *
Netbsd Netbsd 1.5, 1.5.1, 1.5.2, 1.5.3, 1.6
Frees Wan Frees Wan 1.9, 1.9.1, 1.9.2, 1.9.3, 1.9.4, 1.9.5, 1.9.6
Global Technology Associates Gnat Box Firmware 3.1, 3.2, 3.3

References

NameSourceURLTags
NetBSD-SA2002-016ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-016.txt.ascNETBSD
20021018 Denial of Service in IPSEC implementationshttp://razor.bindview.com/publish/advisories/adv_ipsec.htmlBINDVIEWVendor Advisory
DSA-201http://www.debian.org/security/2002/dsa-201DEBIAN
ipsec-packet-integer-overflow(10411)http://www.iss.net/security_center/static/10411.phpXFVendor Advisory
VU#459371http://www.kb.cert.org/vuls/id/459371CERT-VNThird Party Advisory US Government Resource
6011http://www.securityfocus.com/bid/6011BID