Lucene search

K
cve[email protected]CVE-2009-0790
HistoryApr 01, 2009 - 10:30 a.m.

CVE-2009-0790

2009-04-0110:30:00
CWE-20
web.nvd.nist.gov
52
cve-2009-0790
pluto ike daemon
openswan
strongswan ipsec
denial of service
remote attackers
dpd
isakmp
ipsec ike notification
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.1 High

AI Score

Confidence

High

0.834 High

EPSS

Percentile

98.5%

The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD.

Affected configurations

NVD
Node
strongswanstrongswanMatch2.4.0
OR
strongswanstrongswanMatch2.4.0a
OR
strongswanstrongswanMatch2.4.1
OR
strongswanstrongswanMatch2.4.2
OR
strongswanstrongswanMatch2.4.3
OR
strongswanstrongswanMatch2.4.4
OR
strongswanstrongswanMatch2.6.0
OR
strongswanstrongswanMatch2.6.1
OR
strongswanstrongswanMatch2.6.2
OR
strongswanstrongswanMatch2.6.3
OR
strongswanstrongswanMatch2.6.4
OR
strongswanstrongswanMatch2.8.0
OR
strongswanstrongswanMatch2.8.1
OR
strongswanstrongswanMatch2.8.2
OR
strongswanstrongswanMatch2.8.3
OR
strongswanstrongswanMatch2.8.4
OR
strongswanstrongswanMatch2.8.5
OR
strongswanstrongswanMatch2.8.6
OR
strongswanstrongswanMatch2.8.7
OR
strongswanstrongswanMatch2.8.8
OR
strongswanstrongswanMatch4.2.0
OR
strongswanstrongswanMatch4.2.1
OR
strongswanstrongswanMatch4.2.2
OR
strongswanstrongswanMatch4.2.3
OR
strongswanstrongswanMatch4.2.4
OR
strongswanstrongswanMatch4.2.5
OR
strongswanstrongswanMatch4.2.6
OR
strongswanstrongswanMatch4.2.7
OR
strongswanstrongswanMatch4.2.8
OR
strongswanstrongswanMatch4.2.9
OR
strongswanstrongswanMatch4.2.10
OR
strongswanstrongswanMatch4.2.11
OR
strongswanstrongswanMatch4.2.12
OR
strongswanstrongswanMatch4.2.13
OR
xeleranceopenswanMatch2.4.0
OR
xeleranceopenswanMatch2.4.1
OR
xeleranceopenswanMatch2.4.2
OR
xeleranceopenswanMatch2.4.3
OR
xeleranceopenswanMatch2.4.4
OR
xeleranceopenswanMatch2.4.5
OR
xeleranceopenswanMatch2.4.9
OR
xeleranceopenswanMatch2.4.10
OR
xeleranceopenswanMatch2.6.03
OR
xeleranceopenswanMatch2.6.04
OR
xeleranceopenswanMatch2.6.05
OR
xeleranceopenswanMatch2.6.06
OR
xeleranceopenswanMatch2.6.07
OR
xeleranceopenswanMatch2.6.08
OR
xeleranceopenswanMatch2.6.09
OR
xeleranceopenswanMatch2.6.10
OR
xeleranceopenswanMatch2.6.11
OR
xeleranceopenswanMatch2.6.12
OR
xeleranceopenswanMatch2.6.13
OR
xeleranceopenswanMatch2.6.14
OR
xeleranceopenswanMatch2.6.15
OR
xeleranceopenswanMatch2.6.16
OR
xeleranceopenswanMatch2.6.17
OR
xeleranceopenswanMatch2.6.18
OR
xeleranceopenswanMatch2.6.19
OR
xeleranceopenswanMatch2.6.20

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.1 High

AI Score

Confidence

High

0.834 High

EPSS

Percentile

98.5%