Overview
Multiple memory handling vulnerabilities exist in the isakmpd that could allow a remote attacker to cause a denial of service.
Description
The OpenBSD isakmpd establishes security associations for encrypted and authenticated (IPsec) network traffic. It implements the Internet Security Association and Key Management Protocol (ISAKMP) and Internet Key Exchange (IKE) protocol. Under various circumstances, memory allocated by isakmpd during processing of ISAKMP packets was never subsequently freed. As a result, a remote attacker with the ability to craft ISAKMP packets with particular characteristics could cause the isakmpd service to exhaust available memory and crash. |
Impact
A remote attacker could cause the isakmpd service to crash. Subsequent IPsec-enabled communications may be disrupted as a result. |
Solution
Apply a patch from the vendor Patches have been released to address this issue. Please see the Systems Affected section of this document for more details. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was discovered by Rapid7 using their Striker test suite.
This document was written by Chad R Dougherty based on information published in Rapid7 Advisory R7-0018.
Other Information
CVE IDs: | CVE-2004-0222 |
Severity Metric: | 1.69 |
Date Public: | 2004-03-19 |
Date First Published: | 2004-08-27 |
Date Last Updated: | 2004-08-27 13:28 UTC |
Document Revision: | 9 |