ID
VAR-E-200511-0581
CVE
cve_id: | CVE-2005-3669 | Trust: 0.3 |
TITLE
Cisco IPSec Unspecified IKE Traffic Denial Of Service Vulnerabilities
Trust: 0.3
DESCRIPTION
Various Cisco IOS, PIX Firewall, Firewall Services Module (FWSM), VPN 3000 Series Concentrator, and MDS Series SanOS releases are prone to denial of service attacks. These issues are due to security flaws in Cisco's IPSec implementation. The vulnerabilities may be triggered by malformed IKE traffic.
Successful attacks will cause most affected devices to restart. For Cisco MDS Series devices, this is limited to causing the IKE process to restart.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30002.5.2 | Trust: 1.5 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.1 | Trust: 0.6 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.0.3 | Trust: 0.6 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.0 | Trust: 0.6 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.4 | Trust: 0.6 |
vendor: | cisco | model: | ios 12.4 | scope: | ne | version: | - | Trust: 0.6 |
vendor: | cisco | model: | vpn concentrator f | scope: | eq | version: | 30004.7.1 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30004.7.1 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator .b | scope: | eq | version: | 30004.1.5 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator .b | scope: | eq | version: | 30004.0.5 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30004.0.1 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30004.0 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator d | scope: | eq | version: | 30003.6.7 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.6.7 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.6.1 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.6 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.5.5 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.5.4 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.5.3 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.5.2 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.5.1 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.5 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.1.4 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.1.2 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.1.1 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30003.0.4 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator | scope: | eq | version: | 30002.0 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator 4.1.7.b | scope: | eq | version: | 3000 | Trust: 0.3 |
vendor: | cisco | model: | vpn concentrator 4.1.7.a | scope: | eq | version: | 3000 | Trust: 0.3 |
vendor: | cisco | model: | pix/asa | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.3.3(133) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.3.2 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.3.1 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.3(3.109) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.3(3.102) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.3(1) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.3 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.2.3(110) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.2.3 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.2.2.111 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.2.2 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.2.1 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.2(3.100) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.2(3) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.2(2) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.2(1) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.1.5(104) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.1.5 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.1.4 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.1.3 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.1(5) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.1(4) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.1(3) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.1(2) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.1(1) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.0.4 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.0.3 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.0(4.101) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.0(4) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.0(2) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.0(1) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.3(3) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.3(2) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.3(1.200) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.3(1) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.3 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.2(9) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.2(7) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.2(6) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.2(5) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.2(3.210) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.2(2) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.2(1) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.1.4 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.1(4.206) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 4.4(8) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 4.4(7.202) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 4.4(4) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 4.4 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 4.3 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 4.2.2 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 4.2.1 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 4.2(5) | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall b | scope: | eq | version: | 4.1.6 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 4.1.6 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 3.1 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | cisco | model: | pix firewall | scope: | eq | version: | 2.7 | Trust: 0.3 |
vendor: | cisco | model: | mds | scope: | eq | version: | 90002.0(0.86) | Trust: 0.3 |
vendor: | cisco | model: | mds | scope: | eq | version: | 90001.3 | Trust: 0.3 |
vendor: | cisco | model: | mds | scope: | eq | version: | 90001.3(3.33) | Trust: 0.3 |
vendor: | cisco | model: | mds | scope: | eq | version: | 9000 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ys | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ym | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3xx | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3tpc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sxd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | firewall services module | scope: | eq | version: | 2.1(0.208) | Trust: 0.3 |
vendor: | cisco | model: | firewall services module | scope: | eq | version: | 1.1.3 | Trust: 0.3 |
vendor: | cisco | model: | firewall services module | scope: | eq | version: | 1.1.2 | Trust: 0.3 |
vendor: | cisco | model: | firewall services module | scope: | eq | version: | 1.1(3.005) | Trust: 0.3 |
vendor: | cisco | model: | firewall services module | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 t | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 xb | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4 t2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 yq4 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 ym4 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 t8 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3 t5 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 sxe | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 sxd7 | scope: | ne | version: | - | Trust: 0.3 |
EXPLOIT
These issues can be reproduced with the PROTOS IPSec Test Suite.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Failure to Handle Exceptional Conditions
Trust: 0.3
CREDITS
Discovery is credited to Cisco in cooperation with CERT-FI and NISCC.
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2005-3669 | Trust: 0.3 |
db: | BID | id: | 15401 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml | Trust: 0.3 |
url: | http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en | Trust: 0.3 |
SOURCES
db: | BID | id: | 15401 |
LAST UPDATE DATE
2022-07-27T09:36:54.329000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 15401 | date: | 2005-11-14T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 15401 | date: | 2005-11-14T00:00:00 |