CERTA-2004-AVI-100
Vulnerability from certfr_avis

De multiples vulnérabilités présentes dans le service isakmpd peuvent être exploitées par un utilisateur mal intentionné afin de réaliser un déni de service sur la plate-forme vulnérable.

Description

isakmpd est un service de gestion des clefs IKE. isakmpd gère notamment les associations de sécurité (SA ou Security Associations) pour du trafic réseau chiffré et/ou authentifié (IPSEC).

Au moyen de paquets habilement constitués, un utilisateur mal intentionné peut réaliser un déni de service par arrêt intempestif du service ou consommation excessive des ressources du systèmes (mémoire, CPU).

Solution

Pour OpenBSD version 3.4, appliquer le correctif disponible à cette adresse :

ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/015_isakmpd2.patch

Pour OpenBSD version 3.3, appliquer le correctif disponible à cette adresse :

ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/020_isakmpd2.patch
None
Impacted products
Vendor Product Description
OpenBSD OpenBSD OpenBSD 3.4 et versions antérieures ;
OpenBSD OpenBSD OpenBSD-current du 17 mars 2004 et versions antérieures.

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "OpenBSD 3.4 et versions ant\u00e9rieures ;",
      "product": {
        "name": "OpenBSD",
        "vendor": {
          "name": "OpenBSD",
          "scada": false
        }
      }
    },
    {
      "description": "OpenBSD-current du 17 mars 2004 et versions ant\u00e9rieures.",
      "product": {
        "name": "OpenBSD",
        "vendor": {
          "name": "OpenBSD",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nisakmpd est un service de gestion des clefs IKE. isakmpd g\u00e8re notamment\nles associations de s\u00e9curit\u00e9 (SA ou Security Associations) pour du\ntrafic r\u00e9seau chiffr\u00e9 et/ou authentifi\u00e9 (IPSEC).\n\n  \nAu moyen de paquets habilement constitu\u00e9s, un utilisateur mal\nintentionn\u00e9 peut r\u00e9aliser un d\u00e9ni de service par arr\u00eat intempestif du\nservice ou consommation excessive des ressources du syst\u00e8mes (m\u00e9moire,\nCPU).\n\n## Solution\n\nPour OpenBSD version 3.4, appliquer le correctif disponible \u00e0 cette\nadresse :\n\n    ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/015_isakmpd2.patch\n\nPour OpenBSD version 3.3, appliquer le correctif disponible \u00e0 cette\nadresse :\n\n    ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/020_isakmpd2.patch\n",
  "cves": [],
  "initial_release_date": "2004-03-24T00:00:00",
  "last_revision_date": "2004-05-12T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 OpenBSD #015 du 17 mars 2004 :",
      "url": "http://www.openbsd.org/errata.html#isakmpd2"
    },
    {
      "title": "Avis de s\u00e9curit\u00e9 FreeBSD du 31 mars 2004 :",
      "url": "http://www.vuxml.org/freebsd/"
    },
    {
      "title": "Mise \u00e0 jour de s\u00e9curit\u00e9 du paquetage NetBSD isakmpd :",
      "url": "ftp://ftp.netbsd.org/pub/NetBSD/packages/distfiles/vulnerabilities"
    }
  ],
  "reference": "CERTA-2004-AVI-100",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-03-24T00:00:00.000000"
    },
    {
      "description": "ajout r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 FreeBSD et NetBSD.",
      "revision_date": "2004-05-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans le service isakmpd peuvent\n\u00eatre exploit\u00e9es par un utilisateur mal intentionn\u00e9 afin de r\u00e9aliser un\nd\u00e9ni de service sur la plate-forme vuln\u00e9rable.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s de isakmpd sous OpenBSD",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 R7-0018 de Rapid7",
      "url": "http://www.rapid7.com/advisories/R7-0018.html"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…