Vulnerability Name: | CVE-2006-2298 (CCN-26311) | ||||||||
Assigned: | 2006-05-08 | ||||||||
Published: | 2006-05-08 | ||||||||
Updated: | 2017-07-20 | ||||||||
Summary: | The Internet Key Exchange version 1 (IKEv1) implementation in the libike library in Solaris 9 and 10 allows remote attackers to cause a denial of service (in.iked daemon crash) via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. Sun has released patches to address the vulnerability. | ||||||||
CVSS v3 Severity: | 3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Denial of Service | ||||||||
References: | Source: MITRE Type: CNA CVE-2006-2298 Source: CCN Type: SA20050 Sun Solaris libike Denial of Service Vulnerability Source: SECUNIA Type: Vendor Advisory 20050 Source: CCN Type: SECTRACK ID: 1016043 Sun Solaris libike IPSec IKE Processing Bug Lets Remote Users Deny Service Source: SECTRACK Type: UNKNOWN 1016043 Source: CCN Type: Sun Alert ID: 102246 A Security Vulnerability in the "libike" Library May Potentially Cause a Denial of Service to the in.iked(1M) Daemon Source: SUNALERT Type: UNKNOWN 102246 Source: MISC Type: UNKNOWN http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/ Source: MISC Type: UNKNOWN http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en Source: CCN Type: OSVDB ID: 25356 Solaris libike in.iked Remote DoS Source: CCN Type: OSVDB ID: 36584 Solaris libike Library in.iked Unspecified Remote DoS Source: BID Type: UNKNOWN 17902 Source: CCN Type: BID-17902 Sun Solaris LibIKE IKE Exchange Denial Of Service Vulnerability Source: VUPEN Type: UNKNOWN ADV-2006-1733 Source: XF Type: UNKNOWN solaris-libike-dos(26311) Source: XF Type: UNKNOWN solaris-libike-dos(26311) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |