ID

VAR-201505-0238


CVE

CVE-2015-4047


TITLE

IPsec-Tools Denial of service vulnerability

Trust: 1.2

sources: CNNVD: CNNVD-201505-447 // CNNVD: CNNVD-201505-542

DESCRIPTION

racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. IPsec-Tools is a user-space implementation of different IPSec. It is ported from KAME's libipsec, setkey and racoon, and supports various BSD systems. A remote attacker could use this vulnerability to cause a program to deny legitimate users. IPsec-Tools is prone to a denial-of-service vulnerability caused by a NULL-pointer dereference error. A security vulnerability exists in the racoon/gssapi.c file of IPsec-Tools version 0.8.2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3272-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso May 23, 2015 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ipsec-tools CVE ID : CVE-2015-4047 Debian Bug : 785778 Javantea discovered a NULL pointer dereference flaw in racoon, the Internet Key Exchange daemon of ipsec-tools. For the oldstable distribution (wheezy), this problem has been fixed in version 1:0.8.0-14+deb7u1. For the stable distribution (jessie), this problem has been fixed in version 1:0.8.2+20140711-2+deb8u1. For the testing distribution (stretch) and the unstable distribution (sid), this problem will be fixed soon. We recommend that you upgrade your ipsec-tools packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJVYJAbAAoJEAVMuPMTQ89E5RUP/j3MueAGYFpUSwLT3P+kHrSS pxdL5RBqQSXytrcejPyFkaKuva9juPLznlkeXGC5QsTRV/ROAq7ZAVWeIH2qD3X0 BPtF4vILr+5kSrDYbd0dSTx8Wl4Ykk678JSzFQ3lHdzK+4703X5YzT0/YJJaBbEh lWb2QuoDw8eHOGHpGJkRVZYp9nOTllZUmj2IasDFB9IQgQxnAoMmAaQ47MrOYhk3 R+UO9A5eYX1Rs4hiTu0+hhfkYG+DbrtN5uAh205SgLoOHf3lEAhRXifJiBMtKO72 tWsXSZ4Tks89hg6++DSIdsH4l6i56bolHid9DOD4/ivnZzB61k0XjCb8Qn/g850h 0Kxge2kmuQZk2VvomzddWAQLaij6fHSZqgZsL37L46158UJE9Q199oshK+3Mbzoc dq2VbwClQKYcGSBB+AoxwXGVd4JLMGDQxbDKGELlGF4JROfSmMtYbhKpVNnm9+32 o/dqr3BHqLf297uUzsTer92Vc5pfYZEU1lMo1KjleNSRjeWBo91IqsNODrxr6rXw L0ewYQBSRKx9Vg8SRviNCE/muVN+u2HULNZytoiEaI3GXrPbAqjdOi3yVP+PSYEr hISRrhZgGQgADT1gBExBnbSf2C7R00M7jRHhpRdVsqETpMlb2LgKEiCBFRYSMMw5 LCzQhezRPnKq4umUHL0n =Ksk8 -----END PGP SIGNATURE----- . ============================================================================ Ubuntu Security Notice USN-2623-1 June 01, 2015 ipsec-tools vulnerability ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: ipsec-tools could be made to crash if it received specially crafted network traffic. Software Description: - ipsec-tools: IPsec tools for Linux Details: It was discovered that racoon, the ipsec-tools IKE daemon, incorrectly handled certain UDP packets. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: racoon 1:0.8.0-9ubuntu1.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2623-1 CVE-2015-4047 Package Information: https://launchpad.net/ubuntu/+source/ipsec-tools/1:0.8.0-9ubuntu1.1

Trust: 2.7

sources: NVD: CVE-2015-4047 // JVNDB: JVNDB-2015-002861 // CNNVD: CNNVD-201505-447 // BID: 74739 // VULHUB: VHN-82008 // PACKETSTORM: 132045 // PACKETSTORM: 132100

AFFECTED PRODUCTS

vendor:ipsec toolsmodel:ipsec-toolsscope:eqversion:0.8.2

Trust: 2.4

vendor:f5model:big-ip application security managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-iq cloud and orchestrationscope:eqversion:1.0.0

Trust: 1.0

vendor:f5model:big-iq cloudscope:lteversion:4.5.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:11.3.0

Trust: 1.0

vendor:f5model:big-iq securityscope:gteversion:4.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-iq devicescope:lteversion:4.5.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:13.0.0

Trust: 1.0

vendor:f5model:enterprise managerscope:gteversion:3.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:12.1.4

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:f5model:big-iq centralized managementscope:eqversion:4.6.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:11.4.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:13.0.0

Trust: 1.0

vendor:f5model:big-iq cloudscope:gteversion:4.0.0

Trust: 1.0

vendor:f5model:big-iq devicescope:gteversion:4.2.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:12.0.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:21

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip protocol security managerscope:lteversion:11.4.1

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:20

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:12.0.0

Trust: 1.0

vendor:f5model:big-iq securityscope:lteversion:4.5.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:11.6.4

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:lteversion:11.3.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-iq adcscope:eqversion:4.5.0

Trust: 1.0

vendor:f5model:enterprise managerscope:lteversion:3.1.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip protocol security managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:13.0.0

Trust: 1.0

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

sources: BID: 74739 // JVNDB: JVNDB-2015-002861 // CNNVD: CNNVD-201505-542 // NVD: CVE-2015-4047

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-4047
value: HIGH

Trust: 1.0

NVD: CVE-2015-4047
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201505-542
value: HIGH

Trust: 0.6

VULHUB: VHN-82008
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-4047
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-82008
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-82008 // JVNDB: JVNDB-2015-002861 // CNNVD: CNNVD-201505-542 // NVD: CVE-2015-4047

PROBLEMTYPE DATA

problemtype:CWE-476

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-82008 // JVNDB: JVNDB-2015-002861 // NVD: CVE-2015-4047

THREAT TYPE

remote

Trust: 1.4

sources: PACKETSTORM: 132045 // PACKETSTORM: 132100 // CNNVD: CNNVD-201505-447 // CNNVD: CNNVD-201505-542

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201505-542

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002861

PATCH

title:IPsec Tools (日本語情報)url:http://osdn.jp/projects/sfnet_ipsec-tools/

Trust: 0.8

title:IPsec-Toolsurl:http://ipsec-tools.sourceforge.net/

Trust: 0.8

sources: JVNDB: JVNDB-2015-002861

EXTERNAL IDS

db:NVDid:CVE-2015-4047

Trust: 3.0

db:BIDid:74739

Trust: 2.6

db:PACKETSTORMid:131992

Trust: 1.7

db:SECTRACKid:1032397

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2015/05/21/11

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2015/05/20/1

Trust: 1.7

db:JVNDBid:JVNDB-2015-002861

Trust: 0.8

db:CNNVDid:CNNVD-201505-542

Trust: 0.7

db:CNNVDid:CNNVD-201505-447

Trust: 0.6

db:AUSCERTid:ESB-2020.0739

Trust: 0.6

db:PACKETSTORMid:132100

Trust: 0.2

db:PACKETSTORMid:132045

Trust: 0.2

db:VULHUBid:VHN-82008

Trust: 0.1

sources: VULHUB: VHN-82008 // BID: 74739 // JVNDB: JVNDB-2015-002861 // PACKETSTORM: 132045 // PACKETSTORM: 132100 // CNNVD: CNNVD-201505-447 // CNNVD: CNNVD-201505-542 // NVD: CVE-2015-4047

REFERENCES

url:https://www.altsci.com/ipsec/ipsec-tools-sa.html

Trust: 2.5

url:http://www.securityfocus.com/bid/74739

Trust: 2.3

url:http://www.ubuntu.com/usn/usn-2623-1

Trust: 1.8

url:https://support.f5.com/csp/article/k05013313

Trust: 1.7

url:http://www.debian.org/security/2015/dsa-3272

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/159549.html

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/159482.html

Trust: 1.7

url:http://seclists.org/fulldisclosure/2015/may/81

Trust: 1.7

url:http://seclists.org/fulldisclosure/2015/may/83

Trust: 1.7

url:http://packetstormsecurity.com/files/131992/ipsec-tools-0.8.2-denial-of-service.html

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2015/05/20/1

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2015/05/21/11

Trust: 1.7

url:http://www.securitytracker.com/id/1032397

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4047

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4047

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.0739/

Trust: 0.6

url:http://ipsec-tools.sourceforge.net/

Trust: 0.3

url:http://www.debian.org/security/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4047

Trust: 0.2

url:http://www.debian.org/security/faq

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/ipsec-tools/1:0.8.0-9ubuntu1.1

Trust: 0.1

sources: VULHUB: VHN-82008 // BID: 74739 // JVNDB: JVNDB-2015-002861 // PACKETSTORM: 132045 // PACKETSTORM: 132100 // CNNVD: CNNVD-201505-447 // CNNVD: CNNVD-201505-542 // NVD: CVE-2015-4047

CREDITS

Javantea

Trust: 0.9

sources: BID: 74739 // CNNVD: CNNVD-201505-447

SOURCES

db:VULHUBid:VHN-82008
db:BIDid:74739
db:JVNDBid:JVNDB-2015-002861
db:PACKETSTORMid:132045
db:PACKETSTORMid:132100
db:CNNVDid:CNNVD-201505-447
db:CNNVDid:CNNVD-201505-542
db:NVDid:CVE-2015-4047

LAST UPDATE DATE

2024-11-23T23:12:43.052000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-82008date:2019-03-27T00:00:00
db:BIDid:74739date:2015-07-15T00:20:00
db:JVNDBid:JVNDB-2015-002861date:2015-06-03T00:00:00
db:CNNVDid:CNNVD-201505-447date:2015-05-21T00:00:00
db:CNNVDid:CNNVD-201505-542date:2020-03-02T00:00:00
db:NVDid:CVE-2015-4047date:2024-11-21T02:30:21.230

SOURCES RELEASE DATE

db:VULHUBid:VHN-82008date:2015-05-29T00:00:00
db:BIDid:74739date:2015-05-19T00:00:00
db:JVNDBid:JVNDB-2015-002861date:2015-06-03T00:00:00
db:PACKETSTORMid:132045date:2015-05-26T07:25:33
db:PACKETSTORMid:132100date:2015-06-01T23:41:38
db:CNNVDid:CNNVD-201505-447date:2015-05-21T00:00:00
db:CNNVDid:CNNVD-201505-542date:2015-05-26T00:00:00
db:NVDid:CVE-2015-4047date:2015-05-29T15:59:19.030