MEDIUM · 5.0

CVE-2002-0666

IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via sp...

Vulnerability Description

IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors.

CVSS Score

5.0

MEDIUM

AV:N/AC:L/Au:N/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
Frees WanFrees Wan1.9
AppleMac Os X10.2
AppleMac Os X Server10.2
FreebsdFreebsd4.6
NetbsdNetbsd1.5
Global Technology AssociatesGnat Box Firmware3.1
NecBluefire Ix1035 RouterAll versions
NecIx1010All versions
NecIx1011All versions
NecIx1020All versions
NecIx1050All versions
NecIx2010All versions

References

FAQ

What is CVE-2002-0666?

CVE-2002-0666 is a vulnerability with a CVSS score of 5.0 (MEDIUM). IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via sp...

How severe is CVE-2002-0666?

CVE-2002-0666 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2002-0666?

Check the references section above for vendor advisories and patch information. Affected products include: Frees Wan Frees Wan, Apple Mac Os X, Apple Mac Os X Server, Freebsd Freebsd, Netbsd Netbsd.