Vulnerability Details : CVE-2015-4047
racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2015-4047
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- F5 » Big-ip Local Traffic ManagerVersions from including (>=) 12.0.0 and up to, including, (<=) 12.1.4cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Local Traffic ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.6.4cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:*:*:*:*:*:*:*
- F5 » Big-ip Global Traffic ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.6.4cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Application Security ManagerVersions from including (>=) 12.0.0 and up to, including, (<=) 12.1.4cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Application Security ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.6.4cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Access Policy ManagerVersions from including (>=) 12.0.0 and up to, including, (<=) 12.1.4cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Access Policy ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.6.4cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
- F5 » Big-ip Wan Optimization ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.3.0cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:13.0.0:*:*:*:*:*:*:*
- F5 » Big-ip Application Acceleration ManagerVersions from including (>=) 11.4.0 and up to, including, (<=) 11.6.4cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Application Acceleration ManagerVersions from including (>=) 12.0.0 and up to, including, (<=) 12.1.4cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:*:*:*:*:*:*:*
- F5 » Big-ip Advanced Firewall ManagerVersions from including (>=) 11.3.0 and up to, including, (<=) 11.6.4cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Advanced Firewall ManagerVersions from including (>=) 12.0.0 and up to, including, (<=) 12.1.4cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:*:*:*:*:*:*:*
- F5 » Big-ip Policy Enforcement ManagerVersions from including (>=) 11.3.0 and up to, including, (<=) 11.6.4cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Policy Enforcement ManagerVersions from including (>=) 12.0.0 and up to, including, (<=) 12.1.4cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-iq_adc:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-iq_centralized_management:4.6.0:*:*:*:*:*:*:*
- F5 » Big-ip Domain Name SystemVersions from including (>=) 12.0.0 and up to, including, (<=) 12.1.4cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-iq_cloud_and_orchestration:1.0.0:*:*:*:*:*:*:*
- F5 » Big-ip Protocol Security ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.4.1cpe:2.3:a:f5:big-ip_protocol_security_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:ipsec-tools:ipsec-tools:0.8.2:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-4047
1.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-4047
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
CWE ids for CVE-2015-4047
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-4047
-
http://www.openwall.com/lists/oss-security/2015/05/20/1
oss-security - CVE Request: ipsec-toolsMailing List;Exploit;Third Party Advisory
-
https://support.f5.com/csp/article/K05013313
Third Party Advisory
-
http://seclists.org/fulldisclosure/2015/May/83
Full Disclosure: Re: 0-day Denial of Service in IPsec-ToolsMailing List;Exploit;Third Party Advisory
-
http://www.securityfocus.com/bid/74739
IPsec-Tools NULL Pointer Dereference Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://www.ubuntu.com/usn/USN-2623-1
USN-2623-1: ipsec-tools vulnerability | Ubuntu security noticesThird Party Advisory
-
http://www.debian.org/security/2015/dsa-3272
Debian -- Security Information -- DSA-3272-1 ipsec-toolsThird Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159549.html
[SECURITY] Fedora 21 Update: ipsec-tools-0.8.2-1.fc21Mailing List;Third Party Advisory
-
https://www.altsci.com/ipsec/ipsec-tools-sa.html
IPsec-Tools 0-Day Denial of ServiceExploit;Third Party Advisory
-
http://seclists.org/fulldisclosure/2015/May/81
Full Disclosure: 0-day Denial of Service in IPsec-ToolsExploit;Mailing List;Third Party Advisory
-
http://packetstormsecurity.com/files/131992/IPsec-Tools-0.8.2-Denial-Of-Service.html
IPsec-Tools 0.8.2 Denial Of Service ≈ Packet StormThird Party Advisory;VDB Entry
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159482.html
[SECURITY] Fedora 20 Update: ipsec-tools-0.8.2-1.fc20Mailing List;Third Party Advisory
-
http://www.securitytracker.com/id/1032397
IPsec-Tools IKE Null Pointer Dereference Lets Remote Users Deny Service - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2015/05/21/11
oss-security - Re: CVE Request: ipsec-toolsMailing List;Third Party Advisory
Jump to