VAR-200211-0071

Vulnerability from variot - Updated: 2023-12-18 12:24

IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors. IPsec implementations from multiple vendors do not adequately validate the authentication data in IPsec packets, exposing vulnerable systems to a denial of service. IBM AIX In IPSec of esp4_input() There is a vulnerability in the function that does not properly check the integrity of authentication data.There is a possibility of a kernel panic condition. A vulnerability in several implementations of IPSec related to handling of malformed ESP packets has been reported. On several systems, the conditions may be exploited to cause kernel panics. IPSEC is a set of IP security extensions that provide verification and encryption functions. It includes two types of packets, ESP and AH, represented by IP protocols 50 and 51 respectively. Several IPSec implementations have a vulnerability. Remote attackers can exploit this vulnerability to conduct denial of service attacks

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200211-0071",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "frees wan",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "frees wan",
        "version": "1.9.5"
      },
      {
        "model": "frees wan",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "frees wan",
        "version": "1.9.1"
      },
      {
        "model": "frees wan",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "frees wan",
        "version": "1.9"
      },
      {
        "model": "frees wan",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "frees wan",
        "version": "1.9.4"
      },
      {
        "model": "frees wan",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "frees wan",
        "version": "1.9.2"
      },
      {
        "model": "frees wan",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "frees wan",
        "version": "1.9.6"
      },
      {
        "model": "frees wan",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "frees wan",
        "version": "1.9.3"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.3"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.2"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "ix1020",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "nec",
        "version": "*"
      },
      {
        "model": "gnat box",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "global associates",
        "version": "3.2"
      },
      {
        "model": "gnat box",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "global associates",
        "version": "3.3"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "ix1010",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "nec",
        "version": "*"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "ix1011",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "nec",
        "version": "*"
      },
      {
        "model": "ix1050",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "nec",
        "version": "*"
      },
      {
        "model": "ix2010",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "nec",
        "version": "*"
      },
      {
        "model": "bluefire ix1035 router",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "nec",
        "version": "*"
      },
      {
        "model": "gnat box",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "global associates",
        "version": "3.1"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "frees wan",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "global associates",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative iij",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "kame",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nec",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "esoft",
        "version": null
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "4.3"
      },
      {
        "model": "beta",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5x86"
      },
      {
        "model": "sh3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "ix2010",
        "scope": null,
        "trust": 0.3,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "ix1050",
        "scope": null,
        "trust": 0.3,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "ix1020",
        "scope": null,
        "trust": 0.3,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "ix1011",
        "scope": null,
        "trust": 0.3,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "ix1010",
        "scope": null,
        "trust": 0.3,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "bluefire ix1035",
        "scope": null,
        "trust": 0.3,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.3"
      },
      {
        "model": "technology associates gnat box",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "global",
        "version": "3.3"
      },
      {
        "model": "technology associates gnat box",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "global",
        "version": "3.2"
      },
      {
        "model": "technology associates gnat box",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "global",
        "version": "3.1"
      },
      {
        "model": "frees/wan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "frees wan",
        "version": "1.9.6"
      },
      {
        "model": "frees/wan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "frees wan",
        "version": "1.9.5"
      },
      {
        "model": "frees/wan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "frees wan",
        "version": "1.9.4"
      },
      {
        "model": "frees/wan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "frees wan",
        "version": "1.9.3"
      },
      {
        "model": "frees/wan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "frees wan",
        "version": "1.9.2"
      },
      {
        "model": "frees/wan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "frees wan",
        "version": "1.9.1"
      },
      {
        "model": "frees/wan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "frees wan",
        "version": "1.9"
      },
      {
        "model": "-stable",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "-release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "instagate xsp business",
        "scope": null,
        "trust": 0.3,
        "vendor": "esoft",
        "version": null
      },
      {
        "model": "instagate xsp branch",
        "scope": null,
        "trust": 0.3,
        "vendor": "esoft",
        "version": null
      },
      {
        "model": "instagate pro",
        "scope": null,
        "trust": 0.3,
        "vendor": "esoft",
        "version": null
      },
      {
        "model": "bsd/os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bsdi",
        "version": "4.3"
      },
      {
        "model": "bsd/os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "bsdi",
        "version": "4.2"
      },
      {
        "model": "security linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "astaro",
        "version": "3.210"
      },
      {
        "model": "security linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "astaro",
        "version": "3.200"
      },
      {
        "model": "security linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "astaro",
        "version": "2.030"
      },
      {
        "model": "security linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "astaro",
        "version": "2.027"
      },
      {
        "model": "security linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "astaro",
        "version": "2.026"
      },
      {
        "model": "security linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "astaro",
        "version": "2.025"
      },
      {
        "model": "security linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "astaro",
        "version": "2.024"
      },
      {
        "model": "security linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "astaro",
        "version": "2.023"
      },
      {
        "model": "security linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "astaro",
        "version": "2.016"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "security linux",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "astaro",
        "version": "3.211"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#459371"
      },
      {
        "db": "BID",
        "id": "6011"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000311"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0666"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200211-002"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:frees_wan:frees_wan:1.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:frees_wan:frees_wan:1.9.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:frees_wan:frees_wan:1.9.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:frees_wan:frees_wan:1.9.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:frees_wan:frees_wan:1.9.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:frees_wan:frees_wan:1.9.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:frees_wan:frees_wan:1.9.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:global_technology_associates:gnat_box_firmware:3.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:nec:bluefire_ix1035_router:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:nec:ix1010:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:nec:ix1011:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:global_technology_associates:gnat_box_firmware:3.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:nec:ix1050:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:global_technology_associates:gnat_box_firmware:3.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:nec:ix1020:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:nec:ix2010:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0666"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Todd Sabin of Bindview.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200211-002"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2002-0666",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2002-0666",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-5057",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2002-0666",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#459371",
            "trust": 0.8,
            "value": "5.14"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200211-002",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-5057",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#459371"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5057"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000311"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0666"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200211-002"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors. IPsec implementations from multiple vendors do not adequately validate the authentication data in IPsec packets, exposing vulnerable systems to a denial of service. IBM AIX In IPSec of esp4_input() There is a vulnerability in the function that does not properly check the integrity of authentication data.There is a possibility of a kernel panic condition. A vulnerability in several implementations of IPSec related to handling of malformed ESP packets has been reported.  On several systems, the conditions may be exploited to cause kernel panics. IPSEC is a set of IP security extensions that provide verification and encryption functions. It includes two types of packets, ESP and AH, represented by IP protocols 50 and 51 respectively. Several IPSec implementations have a vulnerability. Remote attackers can exploit this vulnerability to conduct denial of service attacks",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0666"
      },
      {
        "db": "CERT/CC",
        "id": "VU#459371"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000311"
      },
      {
        "db": "BID",
        "id": "6011"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5057"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#459371",
        "trust": 3.6
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0666",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "6011",
        "trust": 2.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000311",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200211-002",
        "trust": 0.7
      },
      {
        "db": "BINDVIEW",
        "id": "20021018 DENIAL OF SERVICE IN IPSEC IMPLEMENTATIONS",
        "trust": 0.6
      },
      {
        "db": "NETBSD",
        "id": "NETBSD-SA2002-016",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-201",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "10411",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-5057",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#459371"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5057"
      },
      {
        "db": "BID",
        "id": "6011"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000311"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0666"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200211-002"
      }
    ]
  },
  "id": "VAR-200211-0071",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5057"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:24:44.601000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.ibm.com/jp/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000311"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0666"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://razor.bindview.com/publish/advisories/adv_ipsec.html"
      },
      {
        "trust": 2.8,
        "url": "http://www.kb.cert.org/vuls/id/459371"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/6011"
      },
      {
        "trust": 1.7,
        "url": "http://www.debian.org/security/2002/dsa-201"
      },
      {
        "trust": 1.7,
        "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2002-016.txt.asc"
      },
      {
        "trust": 1.7,
        "url": "http://www.iss.net/security_center/static/10411.php"
      },
      {
        "trust": 0.8,
        "url": "http://www.ietf.org/rfc/rfc2401.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.ietf.org/rfc/rfc2402.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.ietf.org/rfc/rfc2406.txt"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-0666"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-0666"
      },
      {
        "trust": 0.3,
        "url": "http://www.astaro.org/cgi/ultimatebb.cgi?ubb=get_topic;f=1;t=000137"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#459371"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5057"
      },
      {
        "db": "BID",
        "id": "6011"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000311"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0666"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200211-002"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#459371"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5057"
      },
      {
        "db": "BID",
        "id": "6011"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000311"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0666"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200211-002"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-10-17T00:00:00",
        "db": "CERT/CC",
        "id": "VU#459371"
      },
      {
        "date": "2002-11-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-5057"
      },
      {
        "date": "2002-10-19T00:00:00",
        "db": "BID",
        "id": "6011"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2002-000311"
      },
      {
        "date": "2002-11-04T05:00:00",
        "db": "NVD",
        "id": "CVE-2002-0666"
      },
      {
        "date": "2002-10-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200211-002"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-01-06T00:00:00",
        "db": "CERT/CC",
        "id": "VU#459371"
      },
      {
        "date": "2008-09-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-5057"
      },
      {
        "date": "2009-07-11T18:06:00",
        "db": "BID",
        "id": "6011"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2002-000311"
      },
      {
        "date": "2008-09-10T19:12:40.867000",
        "db": "NVD",
        "id": "CVE-2002-0666"
      },
      {
        "date": "2012-11-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200211-002"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200211-002"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple IPsec implementations do not adequately validate authentication data",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#459371"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200211-002"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…