IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors.
References
Link | Resource |
---|---|
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-016.txt.asc | |
http://razor.bindview.com/publish/advisories/adv_ipsec.html | Vendor Advisory |
http://www.debian.org/security/2002/dsa-201 | |
http://www.iss.net/security_center/static/10411.php | Vendor Advisory |
http://www.kb.cert.org/vuls/id/459371 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/6011 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2002-10-25T04:00:00
Updated: 2005-06-01T00:00:00
Reserved: 2002-07-08T00:00:00
Link: CVE-2002-0666
JSON object: View
NVD Information
Status : Analyzed
Published: 2002-11-04T05:00:00.000
Modified: 2008-09-10T19:12:40.867
Link: CVE-2002-0666
JSON object: View
Redhat Information
No data.
CWE