Vulnerability Details : CVE-2006-0905
A "programming error" in fast_ipsec in FreeBSD 4.8-RELEASE through 6.1-STABLE and NetBSD 2 through 3 does not properly update the sequence number associated with a Security Association, which allows packets to pass sequence number checks and allows remote attackers to capture IPSec packets and conduct replay attacks.
Products affected by CVE-2006-0905
- cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.4:stable:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.8:release_p7:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:3.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-0905
1.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-0905
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-0905
-
http://www.securityfocus.com/bid/17191
Patch
-
http://securitytracker.com/id?1015809
-
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:11.ipsec.asc
Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25398
-
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-011.txt.asc
Jump to