Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Security)  >   IPSec Vendors:   HPE
HP-UX IPSec ESP Bug May Grant Access to Remote Users
SecurityTracker Alert ID:  1015320
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 7 2005
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in IPSec on HP-UX. A remote user may be able to obtain plain text portions of encrypted messages.

An unspecified vulnerability exists in HP-UX when running IPSec using Encapsulating Security Payload (ESP) in Tunnel Mode without authentication. A remote user may be able to intercept a portion of the message.

Impact:   A remote user may be able to obtain plain text portions of an encrypted message.
Solution:   No software fix was provided. The vendor indicates that the solution is to configure ESP to use both encryption and authentication. "ECP-DES", ECP-3DES", and "ECP-AES128" provide only encryption and should not be used. More information is available in '/usr/share/doc/ipsec.pdf'.

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  UNIX (HP/UX)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC