var-200209-0033
Vulnerability from variot

Cisco Virtual Private Network (VPN) Client 3.5.4 and earlier allows remote attackers to cause a denial of service (CPU consumption) via a packet with a zero-length payload. Internet Key Exchange (IKE) implementations from several vendors contain buffer overflows and denial-of-service conditions. The buffer overflow vulnerabilities could permit an attacker to execute arbitrary code on a vulnerable system. This is reported to cause the daemon to crash. This issue may be related to the multiple IKE implementation vulnerabilities described in CERT/CC Vulnerability Note VU#287771. Other vendor products are reported to be affected by similar issues. There are currently not enough details available to determine if PGPFreeware is affected by any of these specific issues. This issue was reported in PGPFreeware 7.03 running on Windows NT 4.0 SP6. The Cisco VPN Client is prone to a remotely exploitable buffer overflow condition. It is possible to trigger this condition by sending malformed IKE packets to the client. The overflow occurs when the Security Parameter Index payload of the IKE packet is longer than 16 bytes in length. It is possible that exploitation of this vulnerability may affect availability of the client, resulting in a denial of service condition. This issue is reported to be exploitable when the client software is operating in Aggressive Mode during a phase 1 IKE exchange. This vulnerability affects versions of the client on all platforms. When vulnerable clients receive a specific IKE packet with a zero length payload, the VPN client will consume all available processor time. The Cisco bug ID for these vulnerabilities is CSCdy26045

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200209-0033",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "vpn client",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.5.2"
      },
      {
        "model": "vpn client",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "3.5.1"
      },
      {
        "model": "vpn client for windows",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.5.1"
      },
      {
        "model": "vpn client for solaris",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.5.2"
      },
      {
        "model": "vpn client for solaris",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.5.1"
      },
      {
        "model": "vpn client for mac os",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "x3.5.2"
      },
      {
        "model": "vpn client for mac os",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "x3.5.1"
      },
      {
        "model": "vpn client for linux",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.5.2"
      },
      {
        "model": "vpn client for linux",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.5.1"
      },
      {
        "model": "vpn client for windows",
        "scope": "ne",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.6"
      },
      {
        "model": "vpn client for solaris",
        "scope": "ne",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.6"
      },
      {
        "model": "vpn client for mac os",
        "scope": "ne",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "x3.6"
      },
      {
        "model": "vpn client for linux",
        "scope": "ne",
        "trust": 0.9,
        "vendor": "cisco",
        "version": "3.6"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netscreen",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "network associates",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "pgp",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "safenet",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sonicwall",
        "version": null
      },
      {
        "model": "vpn client for windows",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "3.5.2"
      },
      {
        "model": "openbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openbsd",
        "version": "3.1"
      },
      {
        "model": "openbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openbsd",
        "version": "3.0"
      },
      {
        "model": "netscreen-remote vpn client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "8.0"
      },
      {
        "model": "netscreen-remote security client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "8.0"
      },
      {
        "model": "netscreen-remote vpn client",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "8.1"
      },
      {
        "model": "netscreen-remote security client",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "8.1"
      },
      {
        "model": "associates pgp freeware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "network",
        "version": "7.0.3"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#287771"
      },
      {
        "db": "BID",
        "id": "5589"
      },
      {
        "db": "BID",
        "id": "5668"
      },
      {
        "db": "BID",
        "id": "5449"
      },
      {
        "db": "BID",
        "id": "5441"
      },
      {
        "db": "BID",
        "id": "5443"
      },
      {
        "db": "BID",
        "id": "5440"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200209-021"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0853"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Published in a Cisco Security Advisory.  CERT/CC credits Anton Rager of Avaya Communications with discovery.",
    "sources": [
      {
        "db": "BID",
        "id": "5441"
      },
      {
        "db": "BID",
        "id": "5443"
      },
      {
        "db": "BID",
        "id": "5440"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2002-0853",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2002-0853",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-5244",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2002-0853",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#287771",
            "trust": 0.8,
            "value": "1.03"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200209-021",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-5244",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#287771"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5244"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200209-021"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0853"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Virtual Private Network (VPN) Client 3.5.4 and earlier allows remote attackers to cause a denial of service (CPU consumption) via a packet with a zero-length payload. Internet Key Exchange (IKE) implementations from several vendors contain buffer overflows and denial-of-service conditions.  The buffer overflow vulnerabilities could permit an attacker to execute arbitrary code on a vulnerable system.  This is reported to cause the daemon to crash. \nThis issue may be related to the multiple IKE implementation vulnerabilities described in CERT/CC Vulnerability Note VU#287771. \nOther vendor products are reported to be affected by similar issues.  There are currently not enough details available to determine if PGPFreeware is affected by any of these specific issues. \nThis issue was reported in PGPFreeware 7.03 running on Windows NT 4.0 SP6. The Cisco VPN Client is prone to a remotely exploitable buffer overflow condition.  It is possible to trigger this condition by sending malformed IKE packets to the client.  The overflow occurs when the Security Parameter Index payload of the IKE packet is longer than 16 bytes in length.  It is possible that exploitation of this vulnerability may affect availability of the client, resulting in a denial of service condition. \nThis issue is reported to be exploitable when the client software is operating in Aggressive Mode during a phase 1 IKE exchange. \nThis vulnerability affects versions of the client on all platforms. \nWhen vulnerable clients receive a specific IKE packet with a zero length payload, the VPN client will consume all available processor time. The Cisco bug ID for these vulnerabilities is CSCdy26045",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0853"
      },
      {
        "db": "CERT/CC",
        "id": "VU#287771"
      },
      {
        "db": "BID",
        "id": "5589"
      },
      {
        "db": "BID",
        "id": "5668"
      },
      {
        "db": "BID",
        "id": "5449"
      },
      {
        "db": "BID",
        "id": "5441"
      },
      {
        "db": "BID",
        "id": "5443"
      },
      {
        "db": "BID",
        "id": "5440"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5244"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#287771",
        "trust": 4.0
      },
      {
        "db": "BID",
        "id": "5440",
        "trust": 2.8
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0853",
        "trust": 1.7
      },
      {
        "db": "BID",
        "id": "5668",
        "trust": 1.1
      },
      {
        "db": "BID",
        "id": "5449",
        "trust": 1.1
      },
      {
        "db": "BID",
        "id": "5443",
        "trust": 1.1
      },
      {
        "db": "BID",
        "id": "5441",
        "trust": 1.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200209-021",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "9821",
        "trust": 0.6
      },
      {
        "db": "CISCO",
        "id": "20020812 CISCO VPN CLIENT MULTIPLE VULNERABILITIES",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "5589",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-5244",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#287771"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5244"
      },
      {
        "db": "BID",
        "id": "5589"
      },
      {
        "db": "BID",
        "id": "5668"
      },
      {
        "db": "BID",
        "id": "5449"
      },
      {
        "db": "BID",
        "id": "5441"
      },
      {
        "db": "BID",
        "id": "5443"
      },
      {
        "db": "BID",
        "id": "5440"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200209-021"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0853"
      }
    ]
  },
  "id": "VAR-200209-0033",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5244"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-22T21:23:50.148000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0853"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 4.2,
        "url": "http://www.kb.cert.org/vuls/id/287771"
      },
      {
        "trust": 2.7,
        "url": "http://www.securityfocus.com/bid/5440"
      },
      {
        "trust": 2.7,
        "url": "http://www.cisco.com/warp/public/707/vpnclient-multiple-vuln-pub.shtml"
      },
      {
        "trust": 2.7,
        "url": "http://www.iss.net/security_center/static/9821.php"
      },
      {
        "trust": 0.8,
        "url": "http://www.ietf.org/html.charters/ipsec-charter.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.ietf.org/rfc/rfc2408.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.ietf.org/rfc/rfc2409.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.ietf.org/rfc/rfc2412.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.vpnc.org/"
      },
      {
        "trust": 0.8,
        "url": "http://online.securityfocus.com/bid/5440"
      },
      {
        "trust": 0.8,
        "url": "http://online.securityfocus.com/bid/5441"
      },
      {
        "trust": 0.8,
        "url": "http://online.securityfocus.com/bid/5443"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/5449"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/5668"
      },
      {
        "trust": 0.8,
        "url": "http://ikecrack.sourceforge.net/"
      },
      {
        "trust": 0.8,
        "url": "http://www.nta-monitor.com/ike-scan/"
      },
      {
        "trust": 0.3,
        "url": "http://www.openbsd.org/errata.html#isakmpd"
      },
      {
        "trust": 0.3,
        "url": "http://www.netscreen.com/support/alerts/9_6_02.htm"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#287771"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5244"
      },
      {
        "db": "BID",
        "id": "5589"
      },
      {
        "db": "BID",
        "id": "5668"
      },
      {
        "db": "BID",
        "id": "5449"
      },
      {
        "db": "BID",
        "id": "5441"
      },
      {
        "db": "BID",
        "id": "5443"
      },
      {
        "db": "BID",
        "id": "5440"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200209-021"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0853"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#287771"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5244"
      },
      {
        "db": "BID",
        "id": "5589"
      },
      {
        "db": "BID",
        "id": "5668"
      },
      {
        "db": "BID",
        "id": "5449"
      },
      {
        "db": "BID",
        "id": "5441"
      },
      {
        "db": "BID",
        "id": "5443"
      },
      {
        "db": "BID",
        "id": "5440"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200209-021"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0853"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-08-12T00:00:00",
        "db": "CERT/CC",
        "id": "VU#287771"
      },
      {
        "date": "2002-09-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-5244"
      },
      {
        "date": "2002-07-05T00:00:00",
        "db": "BID",
        "id": "5589"
      },
      {
        "date": "2002-09-07T00:00:00",
        "db": "BID",
        "id": "5668"
      },
      {
        "date": "2002-08-12T00:00:00",
        "db": "BID",
        "id": "5449"
      },
      {
        "date": "2002-08-12T00:00:00",
        "db": "BID",
        "id": "5441"
      },
      {
        "date": "2002-08-12T00:00:00",
        "db": "BID",
        "id": "5443"
      },
      {
        "date": "2002-08-12T00:00:00",
        "db": "BID",
        "id": "5440"
      },
      {
        "date": "2002-08-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200209-021"
      },
      {
        "date": "2002-09-05T04:00:00",
        "db": "NVD",
        "id": "CVE-2002-0853"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-02-09T00:00:00",
        "db": "CERT/CC",
        "id": "VU#287771"
      },
      {
        "date": "2008-09-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-5244"
      },
      {
        "date": "2002-07-05T00:00:00",
        "db": "BID",
        "id": "5589"
      },
      {
        "date": "2002-09-07T00:00:00",
        "db": "BID",
        "id": "5668"
      },
      {
        "date": "2002-08-12T00:00:00",
        "db": "BID",
        "id": "5449"
      },
      {
        "date": "2002-08-12T00:00:00",
        "db": "BID",
        "id": "5441"
      },
      {
        "date": "2002-08-12T00:00:00",
        "db": "BID",
        "id": "5443"
      },
      {
        "date": "2002-08-12T00:00:00",
        "db": "BID",
        "id": "5440"
      },
      {
        "date": "2005-05-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200209-021"
      },
      {
        "date": "2024-11-20T23:40:02.007000",
        "db": "NVD",
        "id": "CVE-2002-0853"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "5589"
      },
      {
        "db": "BID",
        "id": "5668"
      },
      {
        "db": "BID",
        "id": "5449"
      },
      {
        "db": "BID",
        "id": "5441"
      },
      {
        "db": "BID",
        "id": "5443"
      },
      {
        "db": "BID",
        "id": "5440"
      }
    ],
    "trust": 1.8
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple vendors\u0027 Internet Key Exchange (IKE) implementations do not properly handle IKE response packets",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#287771"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Boundary Condition Error",
    "sources": [
      {
        "db": "BID",
        "id": "5668"
      },
      {
        "db": "BID",
        "id": "5449"
      },
      {
        "db": "BID",
        "id": "5441"
      },
      {
        "db": "BID",
        "id": "5443"
      }
    ],
    "trust": 1.2
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.