var-200211-0071
Vulnerability from variot
IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors. IPsec implementations from multiple vendors do not adequately validate the authentication data in IPsec packets, exposing vulnerable systems to a denial of service. IBM AIX In IPSec of esp4_input() There is a vulnerability in the function that does not properly check the integrity of authentication data.There is a possibility of a kernel panic condition. A vulnerability in several implementations of IPSec related to handling of malformed ESP packets has been reported. On several systems, the conditions may be exploited to cause kernel panics. IPSEC is a set of IP security extensions that provide verification and encryption functions. It includes two types of packets, ESP and AH, represented by IP protocols 50 and 51 respectively. Several IPSec implementations have a vulnerability. Remote attackers can exploit this vulnerability to conduct denial of service attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200211-0071", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "frees wan", "scope": "eq", "trust": 1.6, "vendor": "frees wan", "version": "1.9.5" }, { "model": "frees wan", "scope": "eq", "trust": 1.6, "vendor": "frees wan", "version": "1.9.1" }, { "model": "frees wan", "scope": "eq", "trust": 1.6, "vendor": "frees wan", "version": "1.9" }, { "model": "frees wan", "scope": "eq", "trust": 1.6, "vendor": "frees wan", "version": "1.9.4" }, { "model": "frees wan", "scope": "eq", "trust": 1.6, "vendor": "frees wan", "version": "1.9.2" }, { "model": "frees wan", "scope": "eq", "trust": 1.6, "vendor": "frees wan", "version": "1.9.6" }, { "model": "frees wan", "scope": "eq", "trust": 1.6, "vendor": "frees wan", "version": "1.9.3" }, { "model": "netbsd", "scope": "eq", "trust": 1.3, "vendor": "netbsd", "version": "1.6" }, { "model": "netbsd", "scope": "eq", "trust": 1.3, "vendor": "netbsd", "version": "1.5.3" }, { "model": "netbsd", "scope": "eq", "trust": 1.3, "vendor": "netbsd", "version": "1.5.2" }, { "model": "netbsd", "scope": "eq", "trust": 1.3, "vendor": "netbsd", "version": "1.5.1" }, { "model": "netbsd", "scope": "eq", "trust": 1.3, "vendor": "netbsd", "version": "1.5" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.6" }, { "model": "aix", "scope": "eq", "trust": 1.1, "vendor": "ibm", "version": "5.2" }, { "model": "aix", "scope": "eq", "trust": 1.1, "vendor": "ibm", "version": "5.1" }, { "model": "ix1020", "scope": "eq", "trust": 1.0, "vendor": "nec", "version": "*" }, { "model": "gnat box", "scope": "eq", "trust": 1.0, "vendor": "global associates", "version": "3.2" }, { "model": "gnat box", "scope": "eq", "trust": 1.0, "vendor": "global associates", "version": "3.3" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2" }, { "model": "ix1010", "scope": "eq", "trust": 1.0, "vendor": "nec", "version": "*" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2" }, { "model": "ix1011", "scope": "eq", "trust": 1.0, "vendor": "nec", "version": "*" }, { "model": "ix1050", "scope": "eq", "trust": 1.0, "vendor": "nec", "version": "*" }, { "model": "ix2010", "scope": "eq", "trust": 1.0, "vendor": "nec", "version": "*" }, { "model": "bluefire ix1035 router", "scope": "eq", "trust": 1.0, "vendor": "nec", "version": "*" }, { "model": "gnat box", "scope": "eq", "trust": 1.0, "vendor": "global associates", "version": "3.1" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "frees wan", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "global associates", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "internet initiative iij", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "kame", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netbsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "esoft", "version": null }, { "model": "aix", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "4.3" }, { "model": "beta", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "1.6" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "1.5x86" }, { "model": "sh3", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "1.5" }, { "model": "ix2010", "scope": null, "trust": 0.3, "vendor": "nec", "version": null }, { "model": "ix1050", "scope": null, "trust": 0.3, "vendor": "nec", "version": null }, { "model": "ix1020", "scope": null, "trust": 0.3, "vendor": "nec", "version": null }, { "model": "ix1011", "scope": null, "trust": 0.3, "vendor": "nec", "version": null }, { "model": "ix1010", "scope": null, "trust": 0.3, "vendor": "nec", "version": null }, { "model": "bluefire ix1035", "scope": null, "trust": 0.3, "vendor": "nec", "version": null }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.3" }, { "model": "technology associates gnat box", "scope": "eq", "trust": 0.3, "vendor": "global", "version": "3.3" }, { "model": "technology associates gnat box", "scope": "eq", "trust": 0.3, "vendor": "global", "version": "3.2" }, { "model": "technology associates gnat box", "scope": "eq", "trust": 0.3, "vendor": "global", "version": "3.1" }, { "model": "frees/wan", "scope": "eq", "trust": 0.3, "vendor": "frees wan", "version": "1.9.6" }, { "model": "frees/wan", "scope": "eq", "trust": 0.3, "vendor": "frees wan", "version": "1.9.5" }, { "model": "frees/wan", "scope": "eq", "trust": 0.3, "vendor": "frees wan", "version": "1.9.4" }, { "model": "frees/wan", "scope": "eq", "trust": 0.3, "vendor": "frees wan", "version": "1.9.3" }, { "model": "frees/wan", "scope": "eq", "trust": 0.3, "vendor": "frees wan", "version": "1.9.2" }, { "model": "frees/wan", "scope": "eq", "trust": 0.3, "vendor": "frees wan", "version": "1.9.1" }, { "model": "frees/wan", "scope": "eq", "trust": 0.3, "vendor": "frees wan", "version": "1.9" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "instagate xsp business", "scope": null, "trust": 0.3, "vendor": "esoft", "version": null }, { "model": "instagate xsp branch", "scope": null, "trust": 0.3, "vendor": "esoft", "version": null }, { "model": "instagate pro", "scope": null, "trust": 0.3, "vendor": "esoft", "version": null }, { "model": "bsd/os", "scope": "eq", "trust": 0.3, "vendor": "bsdi", "version": "4.3" }, { "model": "bsd/os", "scope": "eq", "trust": 0.3, "vendor": "bsdi", "version": "4.2" }, { "model": "security linux", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "3.210" }, { "model": "security linux", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "3.200" }, { "model": "security linux", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "2.030" }, { "model": "security linux", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "2.027" }, { "model": "security linux", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "2.026" }, { "model": "security linux", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "2.025" }, { "model": "security linux", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "2.024" }, { "model": "security linux", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "2.023" }, { "model": "security linux", "scope": "eq", "trust": 0.3, "vendor": "astaro", "version": "2.016" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "security linux", "scope": "ne", "trust": 0.3, "vendor": "astaro", "version": "3.211" } ], "sources": [ { "db": "CERT/CC", "id": "VU#459371" }, { "db": "BID", "id": "6011" }, { "db": "JVNDB", "id": "JVNDB-2002-000311" }, { "db": "NVD", "id": "CVE-2002-0666" }, { "db": "CNNVD", "id": "CNNVD-200211-002" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:frees_wan:frees_wan:1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:frees_wan:frees_wan:1.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:frees_wan:frees_wan:1.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:frees_wan:frees_wan:1.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:frees_wan:frees_wan:1.9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:frees_wan:frees_wan:1.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:frees_wan:frees_wan:1.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:global_technology_associates:gnat_box_firmware:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:nec:bluefire_ix1035_router:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:nec:ix1010:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:nec:ix1011:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:global_technology_associates:gnat_box_firmware:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:nec:ix1050:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:global_technology_associates:gnat_box_firmware:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:nec:ix1020:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:nec:ix2010:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2002-0666" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Todd Sabin of Bindview.", "sources": [ { "db": "CNNVD", "id": "CNNVD-200211-002" } ], "trust": 0.6 }, "cve": "CVE-2002-0666", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2002-0666", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-5057", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2002-0666", "trust": 1.8, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#459371", "trust": 0.8, "value": "5.14" }, { "author": "CNNVD", "id": "CNNVD-200211-002", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-5057", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#459371" }, { "db": "VULHUB", "id": "VHN-5057" }, { "db": "JVNDB", "id": "JVNDB-2002-000311" }, { "db": "NVD", "id": "CVE-2002-0666" }, { "db": "CNNVD", "id": "CNNVD-200211-002" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors. IPsec implementations from multiple vendors do not adequately validate the authentication data in IPsec packets, exposing vulnerable systems to a denial of service. IBM AIX In IPSec of esp4_input() There is a vulnerability in the function that does not properly check the integrity of authentication data.There is a possibility of a kernel panic condition. A vulnerability in several implementations of IPSec related to handling of malformed ESP packets has been reported. On several systems, the conditions may be exploited to cause kernel panics. IPSEC is a set of IP security extensions that provide verification and encryption functions. It includes two types of packets, ESP and AH, represented by IP protocols 50 and 51 respectively. Several IPSec implementations have a vulnerability. Remote attackers can exploit this vulnerability to conduct denial of service attacks", "sources": [ { "db": "NVD", "id": "CVE-2002-0666" }, { "db": "CERT/CC", "id": "VU#459371" }, { "db": "JVNDB", "id": "JVNDB-2002-000311" }, { "db": "BID", "id": "6011" }, { "db": "VULHUB", "id": "VHN-5057" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#459371", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2002-0666", "trust": 2.8 }, { "db": "BID", "id": "6011", "trust": 2.8 }, { "db": "JVNDB", "id": "JVNDB-2002-000311", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200211-002", "trust": 0.7 }, { "db": "BINDVIEW", "id": "20021018 DENIAL OF SERVICE IN IPSEC IMPLEMENTATIONS", "trust": 0.6 }, { "db": "NETBSD", "id": "NETBSD-SA2002-016", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-201", "trust": 0.6 }, { "db": "XF", "id": "10411", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-5057", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#459371" }, { "db": "VULHUB", "id": "VHN-5057" }, { "db": "BID", "id": "6011" }, { "db": "JVNDB", "id": "JVNDB-2002-000311" }, { "db": "NVD", "id": "CVE-2002-0666" }, { "db": "CNNVD", "id": "CNNVD-200211-002" } ] }, "id": "VAR-200211-0071", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-5057" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:24:44.601000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.ibm.com/jp/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2002-000311" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2002-0666" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://razor.bindview.com/publish/advisories/adv_ipsec.html" }, { "trust": 2.8, "url": "http://www.kb.cert.org/vuls/id/459371" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/6011" }, { "trust": 1.7, "url": "http://www.debian.org/security/2002/dsa-201" }, { "trust": 1.7, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2002-016.txt.asc" }, { "trust": 1.7, "url": "http://www.iss.net/security_center/static/10411.php" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc2401.txt" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc2402.txt" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc2406.txt" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-0666" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-0666" }, { "trust": 0.3, "url": "http://www.astaro.org/cgi/ultimatebb.cgi?ubb=get_topic;f=1;t=000137" } ], "sources": [ { "db": "CERT/CC", "id": "VU#459371" }, { "db": "VULHUB", "id": "VHN-5057" }, { "db": "BID", "id": "6011" }, { "db": "JVNDB", "id": "JVNDB-2002-000311" }, { "db": "NVD", "id": "CVE-2002-0666" }, { "db": "CNNVD", "id": "CNNVD-200211-002" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#459371" }, { "db": "VULHUB", "id": "VHN-5057" }, { "db": "BID", "id": "6011" }, { "db": "JVNDB", "id": "JVNDB-2002-000311" }, { "db": "NVD", "id": "CVE-2002-0666" }, { "db": "CNNVD", "id": "CNNVD-200211-002" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2002-10-17T00:00:00", "db": "CERT/CC", "id": "VU#459371" }, { "date": "2002-11-04T00:00:00", "db": "VULHUB", "id": "VHN-5057" }, { "date": "2002-10-19T00:00:00", "db": "BID", "id": "6011" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2002-000311" }, { "date": "2002-11-04T05:00:00", "db": "NVD", "id": "CVE-2002-0666" }, { "date": "2002-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-200211-002" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2003-01-06T00:00:00", "db": "CERT/CC", "id": "VU#459371" }, { "date": "2008-09-10T00:00:00", "db": "VULHUB", "id": "VHN-5057" }, { "date": "2009-07-11T18:06:00", "db": "BID", "id": "6011" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2002-000311" }, { "date": "2008-09-10T19:12:40.867000", "db": "NVD", "id": "CVE-2002-0666" }, { "date": "2012-11-30T00:00:00", "db": "CNNVD", "id": "CNNVD-200211-002" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200211-002" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple IPsec implementations do not adequately validate authentication data", "sources": [ { "db": "CERT/CC", "id": "VU#459371" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200211-002" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.