Vulnerability Details : CVE-2009-1574
Potential exploit
racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2009-1574
- cpe:2.3:a:ipsec-tools:ipsec-tools:*:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.3:rc4:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.3:rc2:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.3:rc3:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.3:rc5:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.7:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-1574
9.77%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-1574
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2009-1574
-
http://security.gentoo.org/glsa/glsa-200905-03.xml
-
http://www.vupen.com/english/advisories/2009/3184
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://sourceforge.net/project/shownotes.php?group_id=74601&release_id=677611
-
http://secunia.com/advisories/35153
-
http://www.openwall.com/lists/oss-security/2009/04/29/6
Patch
-
https://bugzilla.redhat.com/show_bug.cgi?id=497990
Exploit;Patch
-
http://support.apple.com/kb/HT4298
About the security content of Time Capsule and AirPort Base Station (802.11n) Firmware 7.5.2 - Apple Support
-
http://www.securityfocus.com/bid/34765
-
http://www.redhat.com/support/errata/RHSA-2009-1036.html
-
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2009:012 - openSUSE Security Announce - openSUSE Mailing Lists
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
Juniper Networks - 2015-10 Security Bulletin: CTPView: Multiple Vulnerabilities in CTPView
-
http://secunia.com/advisories/35159
-
http://support.apple.com/kb/HT3937
Page Not Found - Apple Support
-
http://www.mandriva.com/security/advisories?name=MDVSA-2009:112
-
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00746.html
-
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00725.html
-
http://www.debian.org/security/2009/dsa-1804
-
http://secunia.com/advisories/35685
About Secunia Research | Flexera
-
http://www.ubuntu.com/usn/USN-785-1
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9624
-
http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html
Apple - Lists.apple.com
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/50412
-
http://secunia.com/advisories/35113
-
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
-
http://secunia.com/advisories/35212
-
http://www.openwall.com/lists/oss-security/2009/05/04/3
Patch
-
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00789.html
-
http://secunia.com/advisories/35404
Jump to