Vulnerability Name:

CVE-2008-1198 (CCN-41053)

Assigned:2008-02-28
Published:2008-02-28
Updated:2022-02-03
Summary:The default IPSec ifup script in Red Hat Enterprise Linux 3 through 5 configures racoon to use aggressive IKE mode instead of main IKE mode, which makes it easier for remote attackers to conduct brute force attacks by sniffing an unencrypted preshared key (PSK) hash.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:7.1 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:N/A:N)
5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:N/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.5 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.6 Low (REDHAT CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N)
2.1 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Other
References:Source: MITRE
Type: CNA
CVE-2008-1198

Source: CCN
Type: RHSA-2012-0312
Low: initscripts security and bug fix update

Source: SECUNIA
Type: Broken Link
48045

Source: CCN
Type: SA53374
Avaya Aura System Manager Racoon IKE Information Disclosure Weakness

Source: CCN
Type: SECTRACK ID: 1019563
Red Hat Enterprise Linux Default IPSec Script Uses IKE Aggressive Mode

Source: MISC
Type: Exploit
http://www.ernw.de/download/pskattack.pdf

Source: CCN
Type: OSVDB ID: 43144
Red Hat Enterprise Linux IPSec ifup Aggressive Mode PSK Hash Disclosure

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1019563

Source: CCN
Type: Red Hat Bugzilla Bug 435274
CVE-2008-1198 IPSec ifup script allows for aggressive IKE mode

Source: CONFIRM
Type: Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=435274

Source: CCN
Type: ASA-2012-196
initscripts security and bug fix update (RHSA-2012-0312)

Source: XF
Type: UNKNOWN
ipsec-ifup-weak-security(41053)

Source: XF
Type: VDB Entry
ipsec-ifup-weak-security(41053)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:redhat:enterprise_linux:3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:23362
    P
    ELSA-2012:0312: initscripts security and bug fix update (Low)
    2014-05-26
    oval:org.mitre.oval:def:20759
    P
    RHSA-2012:0312: initscripts security and bug fix update (Low)
    2014-02-24
    oval:com.redhat.rhsa:def:20120312
    P
    RHSA-2012:0312: initscripts security and bug fix update (Low)
    2012-02-21
    BACK
    redhat enterprise linux 4.0
    redhat enterprise linux 3.0
    redhat enterprise linux 5.0
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 5
    redhat enterprise linux 5