[VIM] How CVE is handling the ISAKMP mess
Steven M. Christey
coley at mitre.org
Fri Nov 18 15:40:17 EST 2005
All,
FYI. For the ISAKMP PROTOS mess, I've decided to create 3 generic
CANs - one for "denial of service," one for format strings, and one
for buffer overflows - then create specific CANs for specific
implementations when available. One problem with this is that most
vendors probably won't provide enough details to know which type of
issue they're vulnerable to. Cisco just said "denial of service" but
one wonders if they're vulnerable to buffer overflows and are assuming
that their newfangled overflow protection is just a DoS, but I
digress.
PROTOS totally rocks, but these kinds of disclosures are regular
headaches for CVE, because we *should* be producing dozens or hundreds
of CANs, but usually only wind up creating a handful due to lack of
relevant details.
- Steve
======================================================
Name: CVE-2005-3666
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3666
Reference: MISC:http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en
Reference: MISC:http://jvn.jp/niscc/NISCC-273756/index.html
Reference: CERT-VN:VU#226364
Reference: URL:http://www.kb.cert.org/vuls/id/226364
Multiple unspecified format string vulnerabilities in multiple
unspecified implementations of Internet Key Exchange version 1 (IKEv1)
have multiple unspecified attack vectors and impacts, as demonstrated
by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of
information in the original sources, it is likely that this candidate
will be REJECTed once it is known which implementations are actually
vulnerable.
======================================================
Name: CVE-2005-3667
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3667
Reference: MISC:http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en
Reference: MISC:http://jvn.jp/niscc/NISCC-273756/index.html
Reference: CERT-VN:VU#226364
Reference: URL:http://www.kb.cert.org/vuls/id/226364
Multiple unspecified vulnerabilities in multiple unspecified
implementations of Internet Key Exchange version 1 (IKEv1) have
multiple unspecified attack vectors and impacts related to denial of
service, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
NOTE: due to the lack of information in the original sources, it is
likely that this candidate will be REJECTed once it is known which
implementations are actually vulnerable. In addition, since "denial
of service" is an impact and not a vulnerability, it is unknown which
underlying vulnerabilities are actually covered by this particular
candidate.
======================================================
Name: CVE-2005-3668
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3668
Reference: MISC:http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en
Reference: MISC:http://jvn.jp/niscc/NISCC-273756/index.html
Reference: CERT-VN:VU#226364
Reference: URL:http://www.kb.cert.org/vuls/id/226364
Multiple buffer overflows in multiple unspecified implementations of
Internet Key Exchange version 1 (IKEv1) have multiple unspecified
attack vectors and impacts related to denial of service, as
demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to
the lack of information in the original sources, it is likely that
this candidate will be REJECTed once it is known which implementations
are actually vulnerable.
======================================================
Name: CVE-2005-3669
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3669
Reference: MISC:http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en
Reference: CISCO:20051117 Multiple Vulnerabilities Found by PROTOS IPSec Test Suite
Reference: URL:http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml
Reference: MISC:http://jvn.jp/niscc/NISCC-273756/index.html
Reference: CERT-VN:VU#226364
Reference: URL:http://www.kb.cert.org/vuls/id/226364
Multiple unspecified vulnerabilities in the Internet Key Exchange
version 1 (IKEv1) implementation in multiple Cisco products allow
remote attackers to cause a denial of service (device reset) via
certain malformed IKE packets, as demonstrated by the PROTOS ISAKMP
Test Suite for IKEv1.
More information about the VIM
mailing list