Vulnerability Name: | CVE-2008-1198 (CCN-41053) | ||||||||||||||||
Assigned: | 2008-02-28 | ||||||||||||||||
Published: | 2008-02-28 | ||||||||||||||||
Updated: | 2022-02-03 | ||||||||||||||||
Summary: | The default IPSec ifup script in Red Hat Enterprise Linux 3 through 5 configures racoon to use aggressive IKE mode instead of main IKE mode, which makes it easier for remote attackers to conduct brute force attacks by sniffing an unencrypted preshared key (PSK) hash. | ||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||||||||||
CVSS v2 Severity: | 7.1 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:N/A:N) 5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:N/A:N/E:U/RL:U/RC:UR)
3.5 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:U/RC:UR)
2.1 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N/E:U/RL:U/RC:UR)
| ||||||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||||||
Vulnerability Consequences: | Other | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2008-1198 Source: CCN Type: RHSA-2012-0312 Low: initscripts security and bug fix update Source: SECUNIA Type: Broken Link 48045 Source: CCN Type: SA53374 Avaya Aura System Manager Racoon IKE Information Disclosure Weakness Source: CCN Type: SECTRACK ID: 1019563 Red Hat Enterprise Linux Default IPSec Script Uses IKE Aggressive Mode Source: MISC Type: Exploit http://www.ernw.de/download/pskattack.pdf Source: CCN Type: OSVDB ID: 43144 Red Hat Enterprise Linux IPSec ifup Aggressive Mode PSK Hash Disclosure Source: SECTRACK Type: Third Party Advisory, VDB Entry 1019563 Source: CCN Type: Red Hat Bugzilla Bug 435274 CVE-2008-1198 IPSec ifup script allows for aggressive IKE mode Source: CONFIRM Type: Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=435274 Source: CCN Type: ASA-2012-196 initscripts security and bug fix update (RHSA-2012-0312) Source: XF Type: UNKNOWN ipsec-ifup-weak-security(41053) Source: XF Type: VDB Entry ipsec-ifup-weak-security(41053) | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |