ID

VAR-E-200504-0253


CVE

cve_id:CVE-2005-1058

Trust: 0.3

sources: BID: 13033

TITLE

Cisco IOS Unauthorized Security Association Establishment Vulnerability

Trust: 0.3

sources: BID: 13033

DESCRIPTION

Cisco IOS is prone to an issue related to XAUTH and ISAKMP profiles that may allow a malicious VPN client to gain unauthorized access to a VPN.
The vulnerability occurs in a case where attributes in an ISAKMP profile that have been assigned to remote peer are not processed. This will present a window of opportunity for the remote client to initiate Phase 2 IKE negotiation and cause an unauthorized IPSec SA (Security Association) to be established.
It is noted that the vulnerability only affects those ISAKMP profiles that are matched by pre-configured certificate maps.

Trust: 0.3

sources: BID: 13033

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.2zjscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2ywscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2xkscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2cxscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2zhscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zgscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zfscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zdscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zcscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zbscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yyscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yxscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yvscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yuscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2ytscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yrscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yqscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2ypscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2ynscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2ymscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2ylscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2xjscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2syscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2cyscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.3

vendor:ciscomodel:ios 12.2zpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2znscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2suscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2czscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2byscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.3

sources: BID: 13033

EXPLOIT

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

Trust: 0.3

sources: BID: 13033

PRICE

Free

Trust: 0.3

sources: BID: 13033

TYPE

Race Condition Error

Trust: 0.3

sources: BID: 13033

CREDITS

This issue was announced by the vendor.

Trust: 0.3

sources: BID: 13033

EXTERNAL IDS

db:NVDid:CVE-2005-1058

Trust: 0.3

db:BIDid:13033

Trust: 0.3

sources: BID: 13033

SOURCES

db:BIDid:13033

LAST UPDATE DATE

2022-07-27T10:00:06.675000+00:00


SOURCES UPDATE DATE

db:BIDid:13033date:2009-07-12T11:57:00

SOURCES RELEASE DATE

db:BIDid:13033date:2005-04-06T00:00:00