ID

VAR-200511-0016


CVE

CVE-2005-3670


TITLE

Multiple vulnerabilities in Internet Key Exchange (IKE) version 1 implementations

Trust: 0.8

sources: CERT/CC: VU#226364

DESCRIPTION

Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in HP HP-UX B.11.00, B.11.11, and B.11.23 running IPSec, HP Jetdirect 635n IPv6/IPsec Print Server, and HP Tru64 UNIX 5.1B-3 and 5.1B-2/PK4, allow remote attackers to cause a denial of service via certain IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the HP advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to. Numerous vulnerabilities have been reported in various Internet Key Exchange version 1 (IKEv1) implementations. The impacts of these vulnerabilities may allow an attacker to execute arbitrary code, cause a denial-of-service condition, or cause an IKEv1 implementation to behave in an unstable/unpredictable manner. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ I SAKMP (Internet Security Association and Key Management Protocol) Authentication, key management, and SA (security association) of 3 A collective term for multiple protocols. ISAKMP Derived from IKE Is IPSec Key exchange protocol for encrypted communication. In many environments IKEv1 Is used. IKE Communication by phase 1 And phase 2 Divided into phases 1 Then establish a secure communication path, ISAKMP SA Called IKE Exchange own messages. In multiple products ISAKMP/IKE Implementation is illegal ISAKMP Phase 1 There is a problem that causes abnormal behavior when receiving this packet because there is a flaw in the processing of the packet. IKE When a deliberately created packet is sent by a remote attacker with specific information for communication by ISAKMP Services or devices that implement the may be in a service outage.Please refer to the “Overview” for the impact of this vulnerability. HP-UX is prone to denial of service vulnerabilities. These issues are due to security flaws in HP's IPSec implementation. These vulnerabilities may be triggered by malformed IKE traffic. This issue was discovered with the PROTOS ISAKMP Test Suite and is related to the handling of malformed IKEv1 traffic. TITLE: Symantec Firewall/VPN/Gateway ISAKMP Message Processing Denial of Service SECUNIA ADVISORY ID: SA17684 VERIFY ADVISORY: http://secunia.com/advisories/17684/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Symantec Gateway Security 400 Series http://secunia.com/product/6175/ Symantec Gateway Security 300 Series http://secunia.com/product/6176/ Symantec Gateway Security 3.x http://secunia.com/product/6177/ Symantec Gateway Security 2.x http://secunia.com/product/3104/ Symantec Gateway Security 1.x http://secunia.com/product/876/ Symantec Firewall/VPN Appliance 100/200/200R http://secunia.com/product/552/ SOFTWARE: Symantec Enterprise Firewall (SEF) 8.x http://secunia.com/product/3587/ DESCRIPTION: Symantec has acknowledged a vulnerability in various Symantec products, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA17553 Successful exploitation causes a DoS of the dynamic VPN services. The vulnerability has been reported in the following products. Symantec Enterprise Firewall version 8.0 (Windows): Apply SEF8.0-20051114-00. http://www.symantec.com/techsupp/enterprise/products/sym_ent_firewall/sym_ent_fw_8/files.html Symantec Enterprise Firewall version 8.0 (Solaris): Apply SEF8.0-20051114-00. http://www.symantec.com/techsupp/enterprise/products/sym_ent_firewall/sym_ent_fw_8_sol/files.html Symantec Gateway Security 5000 Series version 3.0: Apply SGS3.0-2005114-02. http://www.symantec.com/techsupp/enterprise/products/sym_gateway_security/sgs_5600_3/files.html Symantec Gateway Security 5400 version 2.0.1: Apply SGS2.0.1-20051114-00. http://www.symantec.com/techsupp/enterprise/products/sym_gateway_security/sym_gw_security_201_5400/files.html Symantec Gateway Security 5310 version 1.0: Apply SG7004-20051114-00. http://www.symantec.com/techsupp/enterprise/products/sym_gateway_security/sym_gw_security_1_5310/files.html Symantec Gateway Security 5200/5300 version 1.0: Apply SG7004-20051114-00. http://www.symantec.com/techsupp/enterprise/products/sym_gateway_security/sym_gw_security_1_52005300/files.html Symantec Gateway Security 5100: Apply SG7004-20051114-00. http://www.symantec.com/techsupp/enterprise/products/sym_gateway_security/sym_gw_security_1_5110/files.html Symantec Gateway Security 400 version 2.0: Update to build 1103. http://www.symantec.com/techsupp/enterprise/products/sym_gateway_security/sgs_2_400/files.html Symantec Gateway Security 300 version 2.0: Update to build 1103. http://www.symantec.com/techsupp/enterprise/products/sym_gateway_security/sgs_300s_2/files.html Symantec Firewall /VPN Appliance 200/200R: Update to build 1.8F. http://www.symantec.com/techsupp/enterprise/products/sym_fw_vpn_appliance/sym_fw_vpn_appliance_200r/files.html Symantec Firewall /VPN Appliance 100: Update to build 1.8F. http://www.symantec.com/techsupp/enterprise/products/sym_fw_vpn_appliance/sym_fw_vpn_appliance_100/files.html ORIGINAL ADVISORY: Symantec: http://securityresponse.symantec.com/avcenter/security/Content/2005.11.21.html OTHER REFERENCES: SA17553: http://secunia.com/advisories/17553/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.24

sources: NVD: CVE-2005-3670 // CERT/CC: VU#226364 // JVNDB: JVNDB-2005-000682 // BID: 15560 // BID: 17030 // BID: 15474 // PACKETSTORM: 41734

AFFECTED PRODUCTS

vendor:hpmodel:tru64scope:eqversion:5.1b1

Trust: 1.6

vendor:hpmodel:hp-uxscope:eqversion:11.11

Trust: 1.6

vendor:hpmodel:hp-uxscope:eqversion:11.00

Trust: 1.6

vendor:hpmodel:tru64scope:eqversion:5.1b3

Trust: 1.6

vendor:hpmodel:hp-uxscope:eqversion:11.23

Trust: 1.6

vendor:hpmodel:jetdirect 635nscope:eqversion:*

Trust: 1.0

vendor:check pointmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:fortinetmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:necmodel: - scope: - version: -

Trust: 0.8

vendor:nortelmodel: - scope: - version: -

Trust: 0.8

vendor:openswan linux ipsecmodel: - scope: - version: -

Trust: 0.8

vendor:qnxmodel: - scope: - version: -

Trust: 0.8

vendor:stonesoftmodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0 (x86-64)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (x86)

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 0.8

vendor:ciscomodel:pix firewallscope:eqversion:6.0

Trust: 0.8

vendor:ciscomodel:pix firewallscope:eqversion:6.1

Trust: 0.8

vendor:ciscomodel:pix firewallscope:eqversion:6.2

Trust: 0.8

vendor:ciscomodel:pix firewallscope:eqversion:6.3

Trust: 0.8

vendor:ciscomodel:pix/asascope:eqversion:7.0

Trust: 0.8

vendor:symantecmodel:enterprise firewallscope:eqversion:8.0

Trust: 0.8

vendor:junipermodel:screenosscope:eqversion:5.0

Trust: 0.8

vendor:junipermodel:screenosscope:eqversion:5.2

Trust: 0.8

vendor:check pointmodel:vpn-1/firewall-1scope:eqversion:ng with application intelligence (r54)

Trust: 0.8

vendor:check pointmodel:vpn-1/firewall-1scope:eqversion:ng with application intelligence (r55)

Trust: 0.8

vendor:check pointmodel:vpn-1/firewall-1scope:eqversion:ng with application intelligence (r55w)

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.00

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:hpmodel:jetdirect 635nscope: - version: -

Trust: 0.6

vendor:clavistermodel:security gateway rc1scope:eqversion:8.60.01

Trust: 0.3

vendor:clavistermodel:security gatewayscope:eqversion:8.50.02

Trust: 0.3

vendor:clavistermodel:security gatewayscope:eqversion:8.40.05

Trust: 0.3

vendor:clavistermodel:firewallscope:eqversion:8.30.01

Trust: 0.3

vendor:hpmodel:tru64 b-3scope:eqversion:5.1

Trust: 0.3

vendor:hpmodel:tru64 b-2 pk4scope:eqversion:5.1

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.00scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

sources: CERT/CC: VU#226364 // BID: 15560 // BID: 17030 // BID: 15474 // JVNDB: JVNDB-2005-000682 // CNNVD: CNNVD-200511-250 // NVD: CVE-2005-3670

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2005-3670
value: HIGH

Trust: 1.8

CARNEGIE MELLON: VU#226364
value: 16.54

Trust: 0.8

CNNVD: CNNVD-200511-250
value: HIGH

Trust: 0.6

NVD: CVE-2005-3670
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.8

sources: CERT/CC: VU#226364 // JVNDB: JVNDB-2005-000682 // CNNVD: CNNVD-200511-250 // NVD: CVE-2005-3670

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2005-3670

THREAT TYPE

network

Trust: 0.9

sources: BID: 15560 // BID: 17030 // BID: 15474

TYPE

Failure to Handle Exceptional Conditions

Trust: 0.9

sources: BID: 15560 // BID: 17030 // BID: 15474

CONFIGURATIONS

sources: NVD: CVE-2005-3670

PATCH

title:cisco-sa-20051114-ipsecurl:http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml

Trust: 0.8

title:HPSBUX02076url:http://www2.itrc.hp.com/service/cki/docdisplay.do?docid=c00555601

Trust: 0.8

title:HPSBUX02076url:http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux02076.html

Trust: 0.8

title:PSN-2005-11-007url:http://www.juniper.net/support/security/alerts/psn-2005-11-007.txt

Trust: 0.8

title:AXSA-2006-65:1url:http://www.miraclelinux.com/support/update/list.php?errata_id=362

Trust: 0.8

title:RHSA-2006:0267url:https://rhn.redhat.com/errata/rhsa-2006-0267.html

Trust: 0.8

title:102246url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102246-1

Trust: 0.8

title:102246url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102246-3

Trust: 0.8

title:SYM05-025url:http://securityresponse.symantec.com/avcenter/security/content/2005.11.21.html

Trust: 0.8

title:cisco-sa-20051114-ipsecurl:http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/cisco-sa-20051114-ipsec-j.shtml

Trust: 0.8

title:SYM05-025url:http://www.symantec.com/region/jp/avcenter/security/content/2005.11.21.html

Trust: 0.8

title:Top Pageurl:http://www.checkpoint.co.jp/

Trust: 0.8

title:RHSA-2006:0267url:http://www.jp.redhat.com/support/errata/rhsa/rhsa-2006-0267j.html

Trust: 0.8

sources: JVNDB: JVNDB-2005-000682

EXTERNAL IDS

db:NVDid:CVE-2005-3670

Trust: 3.3

db:CERT/CCid:VU#226364

Trust: 3.2

db:BIDid:15474

Trust: 2.7

db:BIDid:17030

Trust: 1.9

db:SECUNIAid:17621

Trust: 1.6

db:SECTRACKid:1015229

Trust: 1.6

db:SECTRACKid:1015227

Trust: 1.6

db:SECTRACKid:1015727

Trust: 1.6

db:VUPENid:ADV-2005-2462

Trust: 1.6

db:VUPENid:ADV-2006-0880

Trust: 1.6

db:BIDid:15471

Trust: 1.6

db:SECUNIAid:19174

Trust: 1.6

db:SECUNIAid:17598

Trust: 1.6

db:SECUNIAid:17684

Trust: 0.9

db:SECUNIAid:17663

Trust: 0.8

db:SECUNIAid:17838

Trust: 0.8

db:SECUNIAid:17553

Trust: 0.8

db:SECUNIAid:17608

Trust: 0.8

db:SECUNIAid:17668

Trust: 0.8

db:AUSCERTid:ESB-2005.0924

Trust: 0.8

db:BIDid:17902

Trust: 0.8

db:JVNDBid:JVNDB-2005-000682

Trust: 0.8

db:CERT/CCid:HPSBPI02078

Trust: 0.6

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:5642

Trust: 0.6

db:HPid:SSRT050979

Trust: 0.6

db:CNNVDid:CNNVD-200511-250

Trust: 0.6

db:BIDid:15560

Trust: 0.3

db:PACKETSTORMid:41734

Trust: 0.1

sources: CERT/CC: VU#226364 // BID: 15560 // BID: 17030 // BID: 15474 // JVNDB: JVNDB-2005-000682 // PACKETSTORM: 41734 // CNNVD: CNNVD-200511-250 // NVD: CVE-2005-3670

REFERENCES

url:http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en

Trust: 3.3

url:http://jvn.jp/niscc/niscc-273756/index.html

Trust: 3.2

url:http://www.securityfocus.com/bid/15474

Trust: 2.4

url:http://www.kb.cert.org/vuls/id/226364

Trust: 2.4

url:http://secunia.com/advisories/17621/

Trust: 1.6

url:http://www.kb.cert.org/vuls/id/mimg-6j6qs4

Trust: 1.6

url:http://securitytracker.com/id?1015727

Trust: 1.6

url:http://securitytracker.com/id?1015229

Trust: 1.6

url:http://securitytracker.com/id?1015227

Trust: 1.6

url:http://secunia.com/advisories/19174

Trust: 1.6

url:http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1141762289787+28353475&docid=c00602119

Trust: 1.6

url:http://www.securityfocus.com/bid/17030

Trust: 1.6

url:http://www.securityfocus.com/bid/15471

Trust: 1.6

url:http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/

Trust: 1.6

url:http://secunia.com/advisories/17598

Trust: 1.6

url:http://www.vupen.com/english/advisories/2006/0880

Trust: 1.0

url:http://www.vupen.com/english/advisories/2005/2462

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5642

Trust: 1.0

url:http://secunia.com/advisories/17553/

Trust: 0.9

url:http://secunia.com/advisories/17684/

Trust: 0.9

url:http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp

Trust: 0.8

url:http://www.ficora.fi/suomi/tietoturva/varoitukset/varoitus-2005-82.htm

Trust: 0.8

url:http://www.auscert.org.au/5748

Trust: 0.8

url:http://secunia.com/advisories/17608/

Trust: 0.8

url:http://secunia.com/advisories/17668/

Trust: 0.8

url:http://secunia.com/advisories/17663/

Trust: 0.8

url:http://secunia.com/advisories/17838/

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-3670

Trust: 0.8

url:http://www.cpni.gov.uk/products/vulnerabilitydisclosures/default.aspx?id=va-20051114-01014.xml

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-3670

Trust: 0.8

url:http://www.cpni.gov.uk/docs/re-20051114-01014.pdf?lang=en

Trust: 0.8

url:http://www.securityfocus.com/bid/17902

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/2005/20051118_193244.html

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/0880

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2005/2462

Trust: 0.6

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5642

Trust: 0.6

url:https://clientweb.clavister.com/

Trust: 0.3

url:http://www.clavister.com/

Trust: 0.3

url:http://lists.clavister.com/archives/cfw-users/msg01852.html

Trust: 0.3

url:http://www.clavister.com/support/support_update_isakmp.html

Trust: 0.3

url:http://h30097.www3.hp.com/

Trust: 0.3

url:/archive/1/427071

Trust: 0.3

url:http://www.hp.com/products1/unix/

Trust: 0.3

url:http://r.your.hp.com/r/c/r?1.1.hx.dc.w2b6a.candds...dqzg.1mr_.2rqn9k

Trust: 0.3

url:http://www.symantec.com/techsupp/enterprise/products/sym_ent_firewall/sym_ent_fw_8_sol/files.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/3104/

Trust: 0.1

url:http://www.symantec.com/techsupp/enterprise/products/sym_fw_vpn_appliance/sym_fw_vpn_appliance_200r/files.html

Trust: 0.1

url:http://secunia.com/product/6177/

Trust: 0.1

url:http://www.symantec.com/techsupp/enterprise/products/sym_fw_vpn_appliance/sym_fw_vpn_appliance_100/files.html

Trust: 0.1

url:http://www.symantec.com/techsupp/enterprise/products/sym_ent_firewall/sym_ent_fw_8/files.html

Trust: 0.1

url:http://secunia.com/product/3587/

Trust: 0.1

url:http://www.symantec.com/techsupp/enterprise/products/sym_gateway_security/sym_gw_security_1_5310/files.html

Trust: 0.1

url:http://www.symantec.com/techsupp/enterprise/products/sym_gateway_security/sym_gw_security_1_5110/files.html

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6175/

Trust: 0.1

url:http://secunia.com/product/6176/

Trust: 0.1

url:http://secunia.com/product/552/

Trust: 0.1

url:http://securityresponse.symantec.com/avcenter/security/content/2005.11.21.html

Trust: 0.1

url:http://www.symantec.com/techsupp/enterprise/products/sym_gateway_security/sgs_300s_2/files.html

Trust: 0.1

url:http://secunia.com/product/876/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://www.symantec.com/techsupp/enterprise/products/sym_gateway_security/sgs_5600_3/files.html

Trust: 0.1

url:http://www.symantec.com/techsupp/enterprise/products/sym_gateway_security/sgs_2_400/files.html

Trust: 0.1

url:http://www.symantec.com/techsupp/enterprise/products/sym_gateway_security/sym_gw_security_1_52005300/files.html

Trust: 0.1

url:http://www.symantec.com/techsupp/enterprise/products/sym_gateway_security/sym_gw_security_201_5400/files.html

Trust: 0.1

sources: CERT/CC: VU#226364 // BID: 15560 // BID: 17030 // BID: 15474 // JVNDB: JVNDB-2005-000682 // PACKETSTORM: 41734 // CNNVD: CNNVD-200511-250 // NVD: CVE-2005-3670

CREDITS

Discovery is credited to NISCC, CERT-FI, and the Oulu University Secure Programming Group.

Trust: 0.9

sources: BID: 15560 // BID: 17030 // BID: 15474

SOURCES

db:CERT/CCid:VU#226364
db:BIDid:15560
db:BIDid:17030
db:BIDid:15474
db:JVNDBid:JVNDB-2005-000682
db:PACKETSTORMid:41734
db:CNNVDid:CNNVD-200511-250
db:NVDid:CVE-2005-3670

LAST UPDATE DATE

2022-05-29T20:09:53.039000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#226364date:2006-01-03T00:00:00
db:BIDid:15560date:2005-11-24T00:00:00
db:BIDid:17030date:2007-06-27T20:28:00
db:BIDid:15474date:2005-11-16T00:00:00
db:JVNDBid:JVNDB-2005-000682date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200511-250date:2009-03-04T00:00:00
db:NVDid:CVE-2005-3670date:2017-10-11T01:30:00

SOURCES RELEASE DATE

db:CERT/CCid:VU#226364date:2005-11-17T00:00:00
db:BIDid:15560date:2005-11-24T00:00:00
db:BIDid:17030date:2006-03-08T00:00:00
db:BIDid:15474date:2005-11-16T00:00:00
db:JVNDBid:JVNDB-2005-000682date:2007-04-01T00:00:00
db:PACKETSTORMid:41734date:2005-11-22T18:19:46
db:CNNVDid:CNNVD-200511-250date:2005-11-18T00:00:00
db:NVDid:CVE-2005-3670date:2005-11-18T21:03:00