Vulnerability Description
Heap-based buffer overflow in isakmpd on OpenBSD 3.4 through 3.6 allows local users to cause a denial of service (panic) and corrupt memory via IPSEC credentials on a socket.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openbsd | Openbsd | 3.4 |
References
- http://secunia.com/advisories/13443PatchVendor Advisory
- http://securitytracker.com/id?1012511Patch
- http://www.openbsd.org/errata36.htmlPatch
- http://www.osvdb.org/12400
- http://www.securityfocus.com/bid/11928Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18486
- http://secunia.com/advisories/13443PatchVendor Advisory
- http://securitytracker.com/id?1012511Patch
- http://www.openbsd.org/errata36.htmlPatch
- http://www.osvdb.org/12400
- http://www.securityfocus.com/bid/11928Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18486
FAQ
What is CVE-2004-2230?
CVE-2004-2230 is a vulnerability with a CVSS score of 2.1 (LOW). Heap-based buffer overflow in isakmpd on OpenBSD 3.4 through 3.6 allows local users to cause a denial of service (panic) and corrupt memory via IPSEC credentials on a socket.
How severe is CVE-2004-2230?
CVE-2004-2230 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-2230?
Check the references section above for vendor advisories and patch information. Affected products include: Openbsd Openbsd.