CERTA-2004-AVI-100
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités présentes dans le service isakmpd peuvent être exploitées par un utilisateur mal intentionné afin de réaliser un déni de service sur la plate-forme vulnérable.
Description
isakmpd est un service de gestion des clefs IKE. isakmpd gère notamment les associations de sécurité (SA ou Security Associations) pour du trafic réseau chiffré et/ou authentifié (IPSEC).
Au moyen de paquets habilement constitués, un utilisateur mal intentionné peut réaliser un déni de service par arrêt intempestif du service ou consommation excessive des ressources du systèmes (mémoire, CPU).
Solution
Pour OpenBSD version 3.4, appliquer le correctif disponible à cette adresse :
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/015_isakmpd2.patch
Pour OpenBSD version 3.3, appliquer le correctif disponible à cette adresse :
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/020_isakmpd2.patch
None
Impacted products
References
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "OpenBSD 3.4 et versions ant\u00e9rieures ;",
"product": {
"name": "OpenBSD",
"vendor": {
"name": "OpenBSD",
"scada": false
}
}
},
{
"description": "OpenBSD-current du 17 mars 2004 et versions ant\u00e9rieures.",
"product": {
"name": "OpenBSD",
"vendor": {
"name": "OpenBSD",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nisakmpd est un service de gestion des clefs IKE. isakmpd g\u00e8re notamment\nles associations de s\u00e9curit\u00e9 (SA ou Security Associations) pour du\ntrafic r\u00e9seau chiffr\u00e9 et/ou authentifi\u00e9 (IPSEC).\n\n \nAu moyen de paquets habilement constitu\u00e9s, un utilisateur mal\nintentionn\u00e9 peut r\u00e9aliser un d\u00e9ni de service par arr\u00eat intempestif du\nservice ou consommation excessive des ressources du syst\u00e8mes (m\u00e9moire,\nCPU).\n\n## Solution\n\nPour OpenBSD version 3.4, appliquer le correctif disponible \u00e0 cette\nadresse :\n\n ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/015_isakmpd2.patch\n\nPour OpenBSD version 3.3, appliquer le correctif disponible \u00e0 cette\nadresse :\n\n ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/020_isakmpd2.patch\n",
"cves": [],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenBSD #015 du 17 mars 2004 :",
"url": "http://www.openbsd.org/errata.html#isakmpd2"
},
{
"title": "Avis de s\u00e9curit\u00e9 FreeBSD du 31 mars 2004 :",
"url": "http://www.vuxml.org/freebsd/"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 du paquetage NetBSD isakmpd :",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/packages/distfiles/vulnerabilities"
}
],
"reference": "CERTA-2004-AVI-100",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2004-03-24T00:00:00.000000"
},
{
"description": "ajout r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 FreeBSD et NetBSD.",
"revision_date": "2004-05-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans le service isakmpd peuvent\n\u00eatre exploit\u00e9es par un utilisateur mal intentionn\u00e9 afin de r\u00e9aliser un\nd\u00e9ni de service sur la plate-forme vuln\u00e9rable.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s de isakmpd sous OpenBSD",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 R7-0018 de Rapid7",
"url": "http://www.rapid7.com/advisories/R7-0018.html"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…