ID CVE-2005-3733
Summary The Internet Key Exchange version 1 (IKEv1) implementation in Juniper JUNOS and JUNOSe software for M, T, and J-series routers before release 6.4, and E-series routers before 7-1-0, allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
References
Vulnerable Configurations
  • Juniper JUNOS E 7.0.0
    cpe:2.3:o:juniper:junos_e:7.0.0
  • Juniper JUNOS 6.3
    cpe:2.3:o:juniper:junos_j:6.3
  • Juniper JUNOS M 6.3
    cpe:2.3:o:juniper:junos_m:6.3
  • Juniper JUNOS T 6.3
    cpe:2.3:o:juniper:junos_t:6.3
  • Juniper JUNOSe E 7.0.0
    cpe:2.3:o:juniper:junose_e:7.0.0
  • Juniper JUNOSe J 6.3
    cpe:2.3:o:juniper:junose_j:6.3
  • Juniper JUNOSe M 6.3
    cpe:2.3:o:juniper:junose_m:6.3.0
  • Juniper JUNOSe T 6.3
    cpe:2.3:o:juniper:junose_t:6.3
CVSS
Base: 7.5 (as of 21-11-2005 - 21:36)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
refmap via4
bid 15402
cert-vn VU#226364
misc
sectrack 1015203
secunia 17568
vupen ADV-2005-2410
Last major update 07-03-2011 - 21:27
Published 21-11-2005 - 18:03
Back to Top