5
CVSSv2

CVE-2009-0790

Published: 01/04/2009 Updated: 29/07/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 prior to 2.6.21 and 2.4 prior to 2.4.14, and Strongswan 4.2 prior to 4.2.14 and 2.8 prior to 2.8.9, allows remote malicious users to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD.

Vulnerable Product Search on Vulmon Subscribe to Product

strongswan strongswan 4.2.0

strongswan strongswan 4.2.1

strongswan strongswan 4.2.12

strongswan strongswan 4.2.11

strongswan strongswan 2.8.2

strongswan strongswan 2.8.3

strongswan strongswan 2.4.1

strongswan strongswan 2.4.0a

xelerance openswan 2.6.07

xelerance openswan 2.6.08

xelerance openswan 2.6.16

xelerance openswan 2.4.0

xelerance openswan 2.4.3

xelerance openswan 2.4.5

strongswan strongswan 2.6.1

strongswan strongswan 2.6.2

strongswan strongswan 4.2.4

strongswan strongswan 4.2.5

strongswan strongswan 4.2.7

strongswan strongswan 2.8.8

strongswan strongswan 2.8.6

strongswan strongswan 2.8.7

xelerance openswan 2.6.03

xelerance openswan 2.6.04

xelerance openswan 2.6.12

xelerance openswan 2.6.13

xelerance openswan 2.6.17

xelerance openswan 2.6.18

xelerance openswan 2.4.9

strongswan strongswan 2.6.3

strongswan strongswan 2.6.4

strongswan strongswan 4.2.6

strongswan strongswan 4.2.13

strongswan strongswan 2.8.0

strongswan strongswan 2.8.1

strongswan strongswan 2.4.3

strongswan strongswan 2.4.2

xelerance openswan 2.6.05

xelerance openswan 2.6.06

xelerance openswan 2.6.14

xelerance openswan 2.6.15

xelerance openswan 2.6.19

xelerance openswan 2.6.20

strongswan strongswan 2.6.0

strongswan strongswan 4.2.2

strongswan strongswan 4.2.3

strongswan strongswan 4.2.10

strongswan strongswan 4.2.9

strongswan strongswan 4.2.8

strongswan strongswan 2.8.4

strongswan strongswan 2.8.5

strongswan strongswan 2.4.0

strongswan strongswan 2.4.4

xelerance openswan 2.6.09

xelerance openswan 2.6.10

xelerance openswan 2.6.11

xelerance openswan 2.4.2

xelerance openswan 2.4.4

xelerance openswan 2.4.1

xelerance openswan 2.4.10

Vendor Advisories

Synopsis Important: openswan security update Type/Severity Security Advisory: Important Topic Updated openswan packages that fix various security issues are nowavailable for Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Security Response Team ...
Debian Bug report logs - #521949 CVE-2009-0790: DoS Package: openswan; Maintainer for openswan is (unknown); Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Mon, 30 Mar 2009 23:57:02 UTC Severity: grave Tags: security Fixed in version openswan/1:2621+dfsg-1 Done: Rene Mayrhofer <rmayr@debianorg> ...
Two vulnerabilities have been discovered in openswan, an IPSec implementation for linux The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-4190 Dmitry E Oboukhov discovered that the livetest tool is using temporary files insecurely, which could lead to a denial of service attack CVE-2009-0790 Gerd v Eg ...

Exploits

Cisco WRV210 Wireless-G VPN Router - RangeBooster null pointer dereference denial of service exploit ...