CVE-2005-3671

The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:frees_wan:frees_wan:2.04:*:*:*:*:*:*:*
cpe:2.3:a:openswan:openswan:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openswan:openswan:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openswan:openswan:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:openswan:openswan:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:openswan:openswan:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:openswan:openswan:2.2:*:*:*:*:*:*:*
cpe:2.3:a:openswan:openswan:2.3:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2005-11-18 21:03

Updated : 2023-12-10 10:28


NVD link : CVE-2005-3671

Mitre link : CVE-2005-3671

CVE.ORG link : CVE-2005-3671


JSON object : View

Products Affected

openswan

  • openswan

xelerance

  • openswan

frees_wan

  • frees_wan