Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2005-11-17T00:00:00", "descriptions": [{"lang": "en", "value": "The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2005-11-24T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"tags": ["x_refsource_MISC"], "url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en"}, {"name": "15416", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/15416"}, {"name": "FEDORA-2005-1093", "tags": ["vendor-advisory", "x_refsource_FEDORA"], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html"}, {"name": "1015214", "tags": ["vdb-entry", "x_refsource_SECTRACK"], "url": "http://securitytracker.com/id?1015214"}, {"name": "17581", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/17581"}, {"name": "20051214 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html"}, {"tags": ["x_refsource_MISC"], "url": "http://jvn.jp/niscc/NISCC-273756/index.html"}, {"name": "20051213 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html"}, {"name": "GLSA-200512-04", "tags": ["vendor-advisory", "x_refsource_GENTOO"], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml"}, {"tags": ["x_refsource_MISC"], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/"}, {"name": "VU#226364", "tags": ["third-party-advisory", "x_refsource_CERT-VN"], "url": "http://www.kb.cert.org/vuls/id/226364"}, {"name": "18115", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/18115"}, {"name": "17680", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/17680"}, {"name": "FEDORA-2005-1092", "tags": ["vendor-advisory", "x_refsource_FEDORA"], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html"}, {"tags": ["x_refsource_CONFIRM"], "url": "http://www.openswan.org/niscc2/"}, {"name": "17980", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/17980"}, {"name": "SUSE-SA:2005:070", "tags": ["vendor-advisory", "x_refsource_SUSE"], "url": "http://www.novell.com/linux/security/advisories/2005_70_ipsec.html"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3671", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en"}, {"name": "15416", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15416"}, {"name": "FEDORA-2005-1093", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html"}, {"name": "1015214", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015214"}, {"name": "17581", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17581"}, {"name": "20051214 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html"}, {"name": "http://jvn.jp/niscc/NISCC-273756/index.html", "refsource": "MISC", "url": "http://jvn.jp/niscc/NISCC-273756/index.html"}, {"name": "20051213 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html"}, {"name": "GLSA-200512-04", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml"}, {"name": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/", "refsource": "MISC", "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/"}, {"name": "VU#226364", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/226364"}, {"name": "18115", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18115"}, {"name": "17680", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17680"}, {"name": "FEDORA-2005-1092", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html"}, {"name": "http://www.openswan.org/niscc2/", "refsource": "CONFIRM", "url": "http://www.openswan.org/niscc2/"}, {"name": "17980", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17980"}, {"name": "SUSE-SA:2005:070", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_70_ipsec.html"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-07T23:17:23.402Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en"}, {"name": "15416", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/15416"}, {"name": "FEDORA-2005-1093", "tags": ["vendor-advisory", "x_refsource_FEDORA", "x_transferred"], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html"}, {"name": "1015214", "tags": ["vdb-entry", "x_refsource_SECTRACK", "x_transferred"], "url": "http://securitytracker.com/id?1015214"}, {"name": "17581", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/17581"}, {"name": "20051214 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://jvn.jp/niscc/NISCC-273756/index.html"}, {"name": "20051213 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html"}, {"name": "GLSA-200512-04", "tags": ["vendor-advisory", "x_refsource_GENTOO", "x_transferred"], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/"}, {"name": "VU#226364", "tags": ["third-party-advisory", "x_refsource_CERT-VN", "x_transferred"], "url": "http://www.kb.cert.org/vuls/id/226364"}, {"name": "18115", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/18115"}, {"name": "17680", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/17680"}, {"name": "FEDORA-2005-1092", "tags": ["vendor-advisory", "x_refsource_FEDORA", "x_transferred"], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "http://www.openswan.org/niscc2/"}, {"name": "17980", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/17980"}, {"name": "SUSE-SA:2005:070", "tags": ["vendor-advisory", "x_refsource_SUSE", "x_transferred"], "url": "http://www.novell.com/linux/security/advisories/2005_70_ipsec.html"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3671", "datePublished": "2005-11-18T21:00:00", "dateReserved": "2005-11-18T00:00:00", "dateUpdated": "2024-08-07T23:17:23.402Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}