Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-0039

Опубликовано: 10 мая 2005
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.4

Описание

Certain configurations of IPsec, when using Encapsulating Security Payload (ESP) in tunnel mode, integrity protection at a higher layer, or Authentication Header (AH), allow remote attackers to decrypt IPSec communications by modifying the outer packet in ways that cause plaintext data from the inner packet to be returned in ICMP messages, as demonstrated using bit-flipping attacks and (1) Destination Address Rewriting, (2) a modified header length that causes portions of the packet to be interpreted as IP Options, or (3) a modified protocol field and source address.

РелизСтатусПримечание
dapper

not-affected

devel

not-affected

edgy

not-affected

feisty

not-affected

upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 84%
0.02293
Низкий

6.4 Medium

CVSS2

Связанные уязвимости

nvd
больше 20 лет назад

Certain configurations of IPsec, when using Encapsulating Security Payload (ESP) in tunnel mode, integrity protection at a higher layer, or Authentication Header (AH), allow remote attackers to decrypt IPSec communications by modifying the outer packet in ways that cause plaintext data from the inner packet to be returned in ICMP messages, as demonstrated using bit-flipping attacks and (1) Destination Address Rewriting, (2) a modified header length that causes portions of the packet to be interpreted as IP Options, or (3) a modified protocol field and source address.

debian
больше 20 лет назад

Certain configurations of IPsec, when using Encapsulating Security Pay ...

github
больше 3 лет назад

Certain configurations of IPsec, when using Encapsulating Security Payload (ESP) in tunnel mode, integrity protection at a higher layer, or Authentication Header (AH), allow remote attackers to decrypt IPSec communications by modifying the outer packet in ways that cause plaintext data from the inner packet to be returned in ICMP messages, as demonstrated using bit-flipping attacks and (1) Destination Address Rewriting, (2) a modified header length that causes portions of the packet to be interpreted as IP Options, or (3) a modified protocol field and source address.

EPSS

Процентиль: 84%
0.02293
Низкий

6.4 Medium

CVSS2