Vulnerabilities > CVE-2005-3670 - Unspecified vulnerability in HP Hp-Ux, Jetdirect 635N and Tru64
Summary
Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in HP HP-UX B.11.00, B.11.11, and B.11.23 running IPSec, HP Jetdirect 635n IPv6/IPsec Print Server, and HP Tru64 UNIX 5.1B-3 and 5.1B-2/PK4, allow remote attackers to cause a denial of service via certain IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the HP advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Hardware | 1 | |
OS | 5 |
Oval
accepted | 2014-03-24T04:01:43.836-04:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
description | Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in HP HP-UX B.11.00, B.11.11, and B.11.23 running IPSec, HP Jetdirect 635n IPv6/IPsec Print Server, and HP Tru64 UNIX 5.1B-3 and 5.1B-2/PK4, allow remote attackers to cause a denial of service via certain IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the HP advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to. | ||||||||||||
family | unix | ||||||||||||
id | oval:org.mitre.oval:def:5642 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2008-07-07T16:38:36.000-04:00 | ||||||||||||
title | HP-UX Running IPSec, Remote Denial of Service (DoS) | ||||||||||||
version | 39 |
References
- http://jvn.jp/niscc/NISCC-273756/index.html
- http://jvn.jp/niscc/NISCC-273756/index.html
- http://secunia.com/advisories/17598
- http://secunia.com/advisories/17598
- http://secunia.com/advisories/19174
- http://secunia.com/advisories/19174
- http://securitytracker.com/id?1015227
- http://securitytracker.com/id?1015227
- http://securitytracker.com/id?1015229
- http://securitytracker.com/id?1015229
- http://securitytracker.com/id?1015727
- http://securitytracker.com/id?1015727
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/
- http://www.kb.cert.org/vuls/id/226364
- http://www.kb.cert.org/vuls/id/226364
- http://www.kb.cert.org/vuls/id/MIMG-6J6QS4
- http://www.kb.cert.org/vuls/id/MIMG-6J6QS4
- http://www.kb.cert.org/vuls/id/MIMG-6J6QS4
- http://www.kb.cert.org/vuls/id/MIMG-6J6QS4
- http://www.kb.cert.org/vuls/id/MIMG-6J6QS4
- http://www.kb.cert.org/vuls/id/MIMG-6J6QS4
- http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en
- http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en
- http://www.securityfocus.com/bid/15471
- http://www.securityfocus.com/bid/15471
- http://www.securityfocus.com/bid/15474
- http://www.securityfocus.com/bid/15474
- http://www.securityfocus.com/bid/17030
- http://www.securityfocus.com/bid/17030
- http://www.vupen.com/english/advisories/2005/2462
- http://www.vupen.com/english/advisories/2005/2462
- http://www.vupen.com/english/advisories/2006/0880
- http://www.vupen.com/english/advisories/2006/0880
- http://www2.itrc.hp.com/service/cki/docDisplay.do?admit=-1335382922+1141762289787+28353475&docId=c00602119
- http://www2.itrc.hp.com/service/cki/docDisplay.do?admit=-1335382922+1141762289787+28353475&docId=c00602119
- http://www2.itrc.hp.com/service/cki/docDisplay.do?admit=-1335382922+1141762289787+28353475&docId=c00602119
- http://www2.itrc.hp.com/service/cki/docDisplay.do?admit=-1335382922+1141762289787+28353475&docId=c00602119
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5642
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5642