Vulnerability CVE-2015-4047


Published: 2015-05-29

Description:
racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests.

Type:

CWE-476

(NULL Pointer Dereference)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.8/10
6.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Complete
Affected software
Ipsec-tools -> Ipsec-tools 
Fedoraproject -> Fedora 
F5 -> Big-iq centralized management 
F5 -> Big-iq cloud 
F5 -> Big-ip access policy manager 
F5 -> Big-iq cloud and orchestration 
F5 -> Big-ip advanced firewall manager 
F5 -> Big-iq device 
F5 -> Big-ip analytics 
F5 -> Big-iq security 
F5 -> Big-ip application acceleration manager 
F5 -> Enterprise manager 
F5 -> Big-ip application security manager 
F5 -> Big-ip domain name system 
F5 -> Big-ip edge gateway 
F5 -> Big-ip global traffic manager 
F5 -> Big-ip link controller 
F5 -> Big-ip local traffic manager 
F5 -> Big-ip policy enforcement manager 
F5 -> Big-ip wan optimization manager 
F5 -> Big-ip webaccelerator 
F5 -> Big-iq adc 
Debian -> Debian linux 
Canonical -> Ubuntu linux 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159482.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159549.html
http://packetstormsecurity.com/files/131992/IPsec-Tools-0.8.2-Denial-Of-Service.html
http://seclists.org/fulldisclosure/2015/May/81
http://seclists.org/fulldisclosure/2015/May/83
http://www.debian.org/security/2015/dsa-3272
http://www.openwall.com/lists/oss-security/2015/05/20/1
http://www.openwall.com/lists/oss-security/2015/05/21/11
http://www.securityfocus.com/bid/74739
http://www.securitytracker.com/id/1032397
http://www.ubuntu.com/usn/USN-2623-1
https://support.f5.com/csp/article/K05013313
https://www.altsci.com/ipsec/ipsec-tools-sa.html

Copyright 2022, cxsecurity.com

 

Back to Top