CVE-2005-0398
Published Mar 14, 2005
Last updated 7 years ago
Overview
- Description
- The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ipsec-tools:ipsec-tools:0.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AB016E3-49FE-4ADF-8D4A-479D0D1C5AF1" }, { "criteria": "cpe:2.3:a:ipsec-tools:ipsec-tools:0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5630CFB-58BF-4B58-90AB-B44793D91FE6" }, { "criteria": "cpe:2.3:a:kame:racoon:2003-07-11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F311F249-417C-4514-A144-E21A57078574" }, { "criteria": "cpe:2.3:a:kame:racoon:2004-04-05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC1BA7DD-5218-41A0-9D5F-79A45D22A2A4" }, { "criteria": "cpe:2.3:a:kame:racoon:2004-04-07b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92E51298-8789-44B0-B64F-6D8D90034404" }, { "criteria": "cpe:2.3:a:kame:racoon:2004-05-03:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75ABB0EA-A057-486E-BD66-3378B28545BD" }, { "criteria": "cpe:2.3:a:kame:racoon:2005-01-03:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EA01A84-6D57-4EC1-8E8B-29989E786101" }, { "criteria": "cpe:2.3:a:kame:racoon:2005-01-10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44076976-AF46-4181-93B6-F85982185A9A" }, { "criteria": "cpe:2.3:a:kame:racoon:2005-01-17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE031420-9E80-48FC-BB65-92D890A7F688" }, { "criteria": "cpe:2.3:a:kame:racoon:2005-01-24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C34FC11-088E-408D-98B1-DA6F61547FC1" }, { "criteria": "cpe:2.3:a:kame:racoon:2005-01-31:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF541C23-0158-45FE-8F8C-C353874E0090" }, { "criteria": "cpe:2.3:a:kame:racoon:2005-02-07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B37581BA-4F83-4940-8EF4-91575BF37B1D" }, { "criteria": "cpe:2.3:a:kame:racoon:2005-02-14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C044E7C0-F7DF-476D-B58A-9C5493F03BD9" }, { "criteria": "cpe:2.3:a:kame:racoon:2005-02-21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52DAA449-31DC-49F0-83AF-15AA8C318585" }, { "criteria": "cpe:2.3:a:kame:racoon:2005-02-28:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0298AF2-5267-4EE6-B2C4-9C53C3E89A62" }, { "criteria": "cpe:2.3:a:kame:racoon:2005-03-07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DE6D48A-FCF8-4DE1-A2E8-A163D3219827" }, { "criteria": "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29DC217F-C257-4A3C-9CBD-08010C30BEC3" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:altlinux:alt_linux:2.3:*:compact:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64BE98C2-8EFA-4349-9FE2-D62CA63A16C4" }, { "criteria": "cpe:2.3:o:altlinux:alt_linux:2.3:*:junior:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D0AC3A3-A37C-4053-B05F-A031877AC811" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81B543F9-C209-46C2-B0AE-E14818A6992E" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC79FF22-2664-4C40-B0B3-6D23B5F45162" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB89C970-DE94-4E09-A90A-077DB83AD156" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9440B25-D206-4914-9557-B5F030890DEC" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9933557-3BCA-4D92-AD4F-27758A0D3347" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10A60552-15A5-4E95-B3CE-99A4B26260C1" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D74A418-50F0-42C0-ABBC-BBBE718FF025" }, { "criteria": "cpe:2.3:o:suse:suse_linux:*:*:desktop:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81E1499C-E73C-4630-B45B-02C38B7AE90D" }, { "criteria": "cpe:2.3:o:suse:suse_linux:*:*:enterprise_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "059EC93D-0F3F-4FC2-9878-0DB2756B951B" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFABFCE5-4F86-4AE8-9849-BC360AC72098" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5F98B9A-880E-45F0-8C16-12B22970F0D1" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B905C6E9-5058-4FD7-95B6-CD6AB6B2F516" } ], "operator": "OR" } ] } ]