All the vulnerabilites related to safenet - softremote_vpn_client
cve-2007-3157
Vulnerability from cvelistv5
Published
2007-06-11 22:00
Modified
2024-08-07 14:05
Severity ?
EPSS score ?
Summary
IPSecDrv.sys 10.4.0.12 in SafeNET High Assurance Remote 1.4.0 Build 12, and SoftRemote, allows remote attackers to cause a denial of service (infinite loop and system hang) via an invalid packet with certain bytes in an option header, possibly related to the IPv6 support for IPSec.
References
▼ | URL | Tags |
---|---|---|
http://www.digit-labs.org/files/exploits/safenet-dos.c | x_refsource_MISC | |
http://osvdb.org/37137 | vdb-entry, x_refsource_OSVDB | |
http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063859.html | mailing-list, x_refsource_FULLDISC | |
http://secunia.com/advisories/25574 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34775 | vdb-entry, x_refsource_XF | |
http://securityreason.com/securityalert/2803 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/bid/24385 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:05:29.336Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.digit-labs.org/files/exploits/safenet-dos.c" }, { "name": "37137", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/37137" }, { "name": "20070608 SafeNET High Assurance Remote/SoftRemote (IPSecDrv.sys) remote DoS", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063859.html" }, { "name": "25574", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25574" }, { "name": "safenet-ipsecdrv-dos(34775)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34775" }, { "name": "2803", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2803" }, { "name": "24385", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24385" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-06-08T00:00:00", "descriptions": [ { "lang": "en", "value": "IPSecDrv.sys 10.4.0.12 in SafeNET High Assurance Remote 1.4.0 Build 12, and SoftRemote, allows remote attackers to cause a denial of service (infinite loop and system hang) via an invalid packet with certain bytes in an option header, possibly related to the IPv6 support for IPSec." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.digit-labs.org/files/exploits/safenet-dos.c" }, { "name": "37137", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/37137" }, { "name": "20070608 SafeNET High Assurance Remote/SoftRemote (IPSecDrv.sys) remote DoS", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063859.html" }, { "name": "25574", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25574" }, { "name": "safenet-ipsecdrv-dos(34775)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34775" }, { "name": "2803", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2803" }, { "name": "24385", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24385" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3157", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IPSecDrv.sys 10.4.0.12 in SafeNET High Assurance Remote 1.4.0 Build 12, and SoftRemote, allows remote attackers to cause a denial of service (infinite loop and system hang) via an invalid packet with certain bytes in an option header, possibly related to the IPv6 support for IPSec." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.digit-labs.org/files/exploits/safenet-dos.c", "refsource": "MISC", "url": "http://www.digit-labs.org/files/exploits/safenet-dos.c" }, { "name": "37137", "refsource": "OSVDB", "url": "http://osvdb.org/37137" }, { "name": "20070608 SafeNET High Assurance Remote/SoftRemote (IPSecDrv.sys) remote DoS", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063859.html" }, { "name": "25574", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25574" }, { "name": "safenet-ipsecdrv-dos(34775)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34775" }, { "name": "2803", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2803" }, { "name": "24385", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24385" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3157", "datePublished": "2007-06-11T22:00:00", "dateReserved": "2007-06-11T00:00:00", "dateUpdated": "2024-08-07T14:05:29.336Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0573
Vulnerability from cvelistv5
Published
2008-02-05 01:00
Modified
2024-08-07 07:46
Severity ?
EPSS score ?
Summary
IPSecDrv.sys 10.4.0.12 in SafeNET HighAssurance Remote and SoftRemote allows local users to gain privileges via a crafted IPSECDRV_IOCTL IOCTL request.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/5004 | exploit, x_refsource_EXPLOIT-DB | |
http://www.vupen.com/english/advisories/2008/0333 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/28701 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/27496 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1019282 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:46:55.119Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "5004", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5004" }, { "name": "ADV-2008-0333", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0333" }, { "name": "28701", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28701" }, { "name": "27496", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27496" }, { "name": "1019282", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019282" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "IPSecDrv.sys 10.4.0.12 in SafeNET HighAssurance Remote and SoftRemote allows local users to gain privileges via a crafted IPSECDRV_IOCTL IOCTL request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "5004", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5004" }, { "name": "ADV-2008-0333", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0333" }, { "name": "28701", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28701" }, { "name": "27496", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27496" }, { "name": "1019282", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019282" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0573", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IPSecDrv.sys 10.4.0.12 in SafeNET HighAssurance Remote and SoftRemote allows local users to gain privileges via a crafted IPSECDRV_IOCTL IOCTL request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "5004", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5004" }, { "name": "ADV-2008-0333", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0333" }, { "name": "28701", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28701" }, { "name": "27496", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27496" }, { "name": "1019282", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019282" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0573", "datePublished": "2008-02-05T01:00:00", "dateReserved": "2008-02-04T00:00:00", "dateUpdated": "2024-08-07T07:46:55.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-2225
Vulnerability from cvelistv5
Published
2007-02-27 02:00
Modified
2024-09-17 01:46
Severity ?
EPSS score ?
Summary
SafeNet VPN client allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly involving buffer overflows using (1) a large Security Parameter Index (SPI) field, (2) a large number of payloads, or (3) a long payload.
References
▼ | URL | Tags |
---|---|---|
http://www.safenet-inc.com/knowledgebase/read_item.asp?ID=375 | x_refsource_MISC | |
http://www.kb.cert.org/vuls/id/AAMN-59VTUQ | x_refsource_MISC | |
http://www.kb.cert.org/vuls/id/287771 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:59:10.889Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.safenet-inc.com/knowledgebase/read_item.asp?ID=375" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/AAMN-59VTUQ" }, { "name": "VU#287771", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/287771" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SafeNet VPN client allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly involving buffer overflows using (1) a large Security Parameter Index (SPI) field, (2) a large number of payloads, or (3) a long payload." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-02-27T02:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.safenet-inc.com/knowledgebase/read_item.asp?ID=375" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.kb.cert.org/vuls/id/AAMN-59VTUQ" }, { "name": "VU#287771", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/287771" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2225", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SafeNet VPN client allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly involving buffer overflows using (1) a large Security Parameter Index (SPI) field, (2) a large number of payloads, or (3) a long payload." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.safenet-inc.com/knowledgebase/read_item.asp?ID=375", "refsource": "MISC", "url": "http://www.safenet-inc.com/knowledgebase/read_item.asp?ID=375" }, { "name": "http://www.kb.cert.org/vuls/id/AAMN-59VTUQ", "refsource": "MISC", "url": "http://www.kb.cert.org/vuls/id/AAMN-59VTUQ" }, { "name": "VU#287771", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/287771" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2225", "datePublished": "2007-02-27T02:00:00Z", "dateReserved": "2007-02-26T00:00:00Z", "dateUpdated": "2024-09-17T01:46:41.648Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0346
Vulnerability from cvelistv5
Published
2005-02-10 05:00
Modified
2024-08-07 21:13
Severity ?
EPSS score ?
Summary
SafeNet SoftRemote VPN Client stores the VPN password (pre-shared key) in cleartext in memory of the IreIKE.exe process, which allows local users to gain sensitive information if they have access to that process.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/19256 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=110791865522076&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://securitytracker.com/id?1013134 | vdb-entry, x_refsource_SECTRACK | |
http://www.nta-monitor.com/news/vpn-flaws/safenet/index.htm | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:13:53.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "softremote-vpn-password-disclosure(19256)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19256" }, { "name": "20050208 SafeNet SoftRemote VPN Client Issue: Clear-text password", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110791865522076\u0026w=2" }, { "name": "1013134", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013134" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nta-monitor.com/news/vpn-flaws/safenet/index.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "SafeNet SoftRemote VPN Client stores the VPN password (pre-shared key) in cleartext in memory of the IreIKE.exe process, which allows local users to gain sensitive information if they have access to that process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "softremote-vpn-password-disclosure(19256)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19256" }, { "name": "20050208 SafeNet SoftRemote VPN Client Issue: Clear-text password", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110791865522076\u0026w=2" }, { "name": "1013134", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013134" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nta-monitor.com/news/vpn-flaws/safenet/index.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0346", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SafeNet SoftRemote VPN Client stores the VPN password (pre-shared key) in cleartext in memory of the IreIKE.exe process, which allows local users to gain sensitive information if they have access to that process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "softremote-vpn-password-disclosure(19256)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19256" }, { "name": "20050208 SafeNet SoftRemote VPN Client Issue: Clear-text password", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110791865522076\u0026w=2" }, { "name": "1013134", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013134" }, { "name": "http://www.nta-monitor.com/news/vpn-flaws/safenet/index.htm", "refsource": "MISC", "url": "http://www.nta-monitor.com/news/vpn-flaws/safenet/index.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0346", "datePublished": "2005-02-10T05:00:00", "dateReserved": "2005-02-10T00:00:00", "dateUpdated": "2024-08-07T21:13:53.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-5121
Vulnerability from cvelistv5
Published
2008-11-18 00:00
Modified
2024-08-07 10:40
Severity ?
EPSS score ?
Summary
dne2000.sys in Citrix Deterministic Network Enhancer (DNE) 2.21.7.233 through 3.21.7.17464, as used in (1) Cisco VPN Client, (2) Blue Coat WinProxy, and (3) SafeNet SoftRemote and HighAssurance Remote, allows local users to gain privileges via a crafted DNE_IOCTL DeviceIoControl request to the \\.\DNE device interface.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:40:17.197Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#858993", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/858993" }, { "name": "ADV-2008-1867", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1867" }, { "name": "5837", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5837" }, { "name": "ADV-2008-1868", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1868" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.digit-labs.org/files/exploits/dne2000-call.c" }, { "name": "30728", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30728" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.citrix.com/article/CTX117751" }, { "name": "29772", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29772" }, { "name": "4600", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4600" }, { "name": "ADV-2008-1865", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1865" }, { "name": "30753", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30753" }, { "name": "multiple-vendors-dne2000-priv-escalation(43153)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43153" }, { "name": "ADV-2008-1866", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1866" }, { "name": "30744", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30744" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails\u0026bugId=CSCsm25860" }, { "name": "30747", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30747" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "dne2000.sys in Citrix Deterministic Network Enhancer (DNE) 2.21.7.233 through 3.21.7.17464, as used in (1) Cisco VPN Client, (2) Blue Coat WinProxy, and (3) SafeNet SoftRemote and HighAssurance Remote, allows local users to gain privileges via a crafted DNE_IOCTL DeviceIoControl request to the \\\\.\\DNE device interface." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "VU#858993", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/858993" }, { "name": "ADV-2008-1867", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1867" }, { "name": "5837", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5837" }, { "name": "ADV-2008-1868", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1868" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.digit-labs.org/files/exploits/dne2000-call.c" }, { "name": "30728", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30728" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.citrix.com/article/CTX117751" }, { "name": "29772", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29772" }, { "name": "4600", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4600" }, { "name": "ADV-2008-1865", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1865" }, { "name": "30753", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30753" }, { "name": "multiple-vendors-dne2000-priv-escalation(43153)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43153" }, { "name": "ADV-2008-1866", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1866" }, { "name": "30744", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30744" }, { "tags": [ "x_refsource_MISC" ], "url": "http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails\u0026bugId=CSCsm25860" }, { "name": "30747", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30747" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5121", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dne2000.sys in Citrix Deterministic Network Enhancer (DNE) 2.21.7.233 through 3.21.7.17464, as used in (1) Cisco VPN Client, (2) Blue Coat WinProxy, and (3) SafeNet SoftRemote and HighAssurance Remote, allows local users to gain privileges via a crafted DNE_IOCTL DeviceIoControl request to the \\\\.\\DNE device interface." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#858993", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/858993" }, { "name": "ADV-2008-1867", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1867" }, { "name": "5837", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5837" }, { "name": "ADV-2008-1868", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1868" }, { "name": "http://www.digit-labs.org/files/exploits/dne2000-call.c", "refsource": "MISC", "url": "http://www.digit-labs.org/files/exploits/dne2000-call.c" }, { "name": "30728", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30728" }, { "name": "http://support.citrix.com/article/CTX117751", "refsource": "CONFIRM", "url": "http://support.citrix.com/article/CTX117751" }, { "name": "29772", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29772" }, { "name": "4600", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4600" }, { "name": "ADV-2008-1865", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1865" }, { "name": "30753", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30753" }, { "name": "multiple-vendors-dne2000-priv-escalation(43153)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43153" }, { "name": "ADV-2008-1866", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1866" }, { "name": "30744", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30744" }, { "name": "http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails\u0026bugId=CSCsm25860", "refsource": "MISC", "url": "http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails\u0026bugId=CSCsm25860" }, { "name": "30747", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30747" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5121", "datePublished": "2008-11-18T00:00:00", "dateReserved": "2008-11-17T00:00:00", "dateUpdated": "2024-08-07T10:40:17.197Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:54
Severity ?
Summary
SafeNet SoftRemote VPN Client stores the VPN password (pre-shared key) in cleartext in memory of the IreIKE.exe process, which allows local users to gain sensitive information if they have access to that process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
safenet | softremote_vpn_client | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:safenet:softremote_vpn_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C384818-1B30-4EBA-99DE-E64008F72985", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SafeNet SoftRemote VPN Client stores the VPN password (pre-shared key) in cleartext in memory of the IreIKE.exe process, which allows local users to gain sensitive information if they have access to that process." } ], "id": "CVE-2005-0346", "lastModified": "2024-11-20T23:54:56.397", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=110791865522076\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1013134" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.nta-monitor.com/news/vpn-flaws/safenet/index.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=110791865522076\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1013134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.nta-monitor.com/news/vpn-flaws/safenet/index.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19256" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2024-11-20 23:43
Severity ?
Summary
SafeNet VPN client allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly involving buffer overflows using (1) a large Security Parameter Index (SPI) field, (2) a large number of payloads, or (3) a long payload.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
safenet | softremote_vpn_client | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:safenet:softremote_vpn_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C384818-1B30-4EBA-99DE-E64008F72985", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SafeNet VPN client allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly involving buffer overflows using (1) a large Security Parameter Index (SPI) field, (2) a large number of payloads, or (3) a long payload." } ], "id": "CVE-2002-2225", "lastModified": "2024-11-20T23:43:10.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/287771" }, { "source": "cve@mitre.org", "url": "http://www.kb.cert.org/vuls/id/AAMN-59VTUQ" }, { "source": "cve@mitre.org", "url": "http://www.safenet-inc.com/knowledgebase/read_item.asp?ID=375" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/287771" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kb.cert.org/vuls/id/AAMN-59VTUQ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.safenet-inc.com/knowledgebase/read_item.asp?ID=375" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-06-11 22:30
Modified
2024-11-21 00:32
Severity ?
Summary
IPSecDrv.sys 10.4.0.12 in SafeNET High Assurance Remote 1.4.0 Build 12, and SoftRemote, allows remote attackers to cause a denial of service (infinite loop and system hang) via an invalid packet with certain bytes in an option header, possibly related to the IPv6 support for IPSec.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
safenet | safenet_highassurance_remote | 1.4.0_build_12 | |
safenet | softremote_vpn_client | 1.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:safenet:safenet_highassurance_remote:1.4.0_build_12:*:*:*:*:*:*:*", "matchCriteriaId": "3C6A97BC-82B8-4F17-A736-D924E4E984A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:safenet:softremote_vpn_client:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "B1EC9A9F-0F53-4D76-BEA8-2174D264E5EF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IPSecDrv.sys 10.4.0.12 in SafeNET High Assurance Remote 1.4.0 Build 12, and SoftRemote, allows remote attackers to cause a denial of service (infinite loop and system hang) via an invalid packet with certain bytes in an option header, possibly related to the IPv6 support for IPSec." }, { "lang": "es", "value": "IPSecDrv.sys 10.4.0.12 en SafeNET High Assurance Remote 1.4.0 Build 12, y SoftRemote, permiet a atacantes remotos provocar denegaci\u00f3n de servicio (bucle infinito y cuelgue del sistema)a trav\u00e9s de paquetes no v\u00e1lidos con ciertos bytes en una cabecera opciones, posiblemente relacionado con el soporte de IPv6 para IPSec." } ], "id": "CVE-2007-3157", "lastModified": "2024-11-21T00:32:32.417", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-06-11T22:30:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063859.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/37137" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/25574" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2803" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.digit-labs.org/files/exploits/safenet-dos.c" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/24385" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34775" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063859.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/37137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25574" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.digit-labs.org/files/exploits/safenet-dos.c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/24385" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34775" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-02-05 02:00
Modified
2024-11-21 00:42
Severity ?
Summary
IPSecDrv.sys 10.4.0.12 in SafeNET HighAssurance Remote and SoftRemote allows local users to gain privileges via a crafted IPSECDRV_IOCTL IOCTL request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
safenet | ipsecdrv.sys | 10.4.0.12 | |
safenet | safenet_highassurance_remote | 1.4.12 | |
safenet | softremote_vpn_client | 1.4.12 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:safenet:ipsecdrv.sys:10.4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "791F998D-89BF-4DF3-B9BF-EC922CE80E8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:safenet:safenet_highassurance_remote:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "9A784704-A62C-4652-8670-D846E84CE98F", "vulnerable": true }, { "criteria": "cpe:2.3:a:safenet:softremote_vpn_client:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "726FC734-87A0-44E8-8D43-CAFFAA7AAC32", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IPSecDrv.sys 10.4.0.12 in SafeNET HighAssurance Remote and SoftRemote allows local users to gain privileges via a crafted IPSECDRV_IOCTL IOCTL request." }, { "lang": "es", "value": "IPSecDrv.sys 10.4.0.12 en SafeNET HighAssurance Remote y SoftRemote. Permite a usuarios locales ganar privilegios a trav\u00e9s de peticiones IPSECDRV_IOCTL IOCTL manipuladas." } ], "id": "CVE-2008-0573", "lastModified": "2024-11-21T00:42:25.007", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-02-05T02:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28701" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/27496" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019282" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0333" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/5004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/27496" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5004" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-11-18 00:30
Modified
2024-11-21 00:53
Severity ?
Summary
dne2000.sys in Citrix Deterministic Network Enhancer (DNE) 2.21.7.233 through 3.21.7.17464, as used in (1) Cisco VPN Client, (2) Blue Coat WinProxy, and (3) SafeNet SoftRemote and HighAssurance Remote, allows local users to gain privileges via a crafted DNE_IOCTL DeviceIoControl request to the \\.\DNE device interface.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
citrix | deterministic_network_enhancer | 2.21.7.223 | |
citrix | deterministic_network_enhancer | 3.21.7.17464 | |
bluecoat | winproxy | * | |
cisco | vpn_client | * | |
safenet | highassurance_remote | * | |
safenet | softremote_vpn_client | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:deterministic_network_enhancer:2.21.7.223:*:*:*:*:*:*:*", "matchCriteriaId": "10F0D8E9-67F6-4484-9BD1-A16228A41D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:deterministic_network_enhancer:3.21.7.17464:*:*:*:*:*:*:*", "matchCriteriaId": "153E29F0-3E68-4CF3-B5B3-8A63E101A650", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:bluecoat:winproxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC5D863E-670D-4849-960B-FEEA70C95E74", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:vpn_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "099829D2-EC37-4BEF-91B7-375478189C1B", "vulnerable": false }, { "criteria": "cpe:2.3:a:safenet:highassurance_remote:*:*:*:*:*:*:*:*", "matchCriteriaId": "7212B1EF-2AD3-42DD-A6D7-DB18F3ED2923", "vulnerable": false }, { "criteria": "cpe:2.3:a:safenet:softremote_vpn_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C384818-1B30-4EBA-99DE-E64008F72985", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "dne2000.sys in Citrix Deterministic Network Enhancer (DNE) 2.21.7.233 through 3.21.7.17464, as used in (1) Cisco VPN Client, (2) Blue Coat WinProxy, and (3) SafeNet SoftRemote and HighAssurance Remote, allows local users to gain privileges via a crafted DNE_IOCTL DeviceIoControl request to the \\\\.\\DNE device interface." }, { "lang": "es", "value": "dne2000.sys en Citrix Deterministic Network Enhancer (DNE) desde la version 2.21.7.233 a la 3.21.7.17464, tal y como se usa en (1) Cisco VPN Client, (2) Blue Coat WinProxy, y (3) SafeNet SoftRemote y HighAssurance Remote, permite a usuarios locales obtener privilegios a trav\u00e9s de una petici\u00f3n DNE_IOCTL DeviceIoControl modificada a la interfaz de dispositivo \\\\.\\DNE .\r\n\r\n" } ], "id": "CVE-2008-5121", "lastModified": "2024-11-21T00:53:20.093", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-11-18T00:30:00.517", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30728" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30744" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30747" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/30753" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4600" }, { "source": "cve@mitre.org", "url": "http://support.citrix.com/article/CTX117751" }, { "source": "cve@mitre.org", "url": "http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails\u0026bugId=CSCsm25860" }, { "source": "cve@mitre.org", "url": "http://www.digit-labs.org/files/exploits/dne2000-call.c" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/858993" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/29772" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1865" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1866" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1867" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1868" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43153" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/5837" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30744" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30747" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4600" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.citrix.com/article/CTX117751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails\u0026bugId=CSCsm25860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.digit-labs.org/files/exploits/dne2000-call.c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/858993" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/29772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1865" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5837" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }