SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   IPSec Vendors:   [Multiple Authors/Vendors]
IPSec Bug in 'xform_esp.c' May Let Remote Users Bypass Anti-Replay Sequence Number Checking
SecurityTracker Alert ID:  1015809
SecurityTracker URL:  http://securitytracker.com/id/1015809
CVE Reference:   CVE-2006-0905   (Links to External Site)
Date:  Mar 23 2006
Impact:   Modification of user information


Description:   A vulnerability was reported in IPSec. A remote user may be able to bypass the anti-replay mechanism.

There is a programming error in the fast_ipsec(4) implementation in FreeBSD (and possibly other implementations) that does not properly track sequence numbers and, as a result, sequence numbers with a Security Association are not updated. This allows packets to unconditionally pass the sequence number verification checks.

The vulnerability resides in 'xform_esp.c'.

Pawel Jakub Dawidek discovered this vulnerability.

Impact:   A remote user may be able to bypass the anti-replay sequence number checking mechanism.
Solution:   Individual vendors are issuing fixes for their particular distributions.
Cause:   State error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Mar 23 2006 (FreeBSD Issues Fix) IPSec Bug in 'xform_esp.c' May Let Remote Users Bypass Anti-Replay Sequence Number Checking
FreeBSD has released a fix.
Apr 13 2006 (NetBSD Issues Fix) IPSec Bug in 'xform_esp.c' May Let Remote Users Bypass Anti-Replay Sequence Number Checking
NetBSD has released a fix.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC