Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

IKE:MALFORMED:2MANY-PAYLOAD

Severity

High

Recommended

No

Category

IKE

Keywords

cisco ike payload

Release Date

2004/02/02

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

IKE: Too Many Payloads


This protocol anomaly is an IKE packet that carries too many payloads. Cisco VPN clients are vulnerable to a remotely exploitable buffer overflow condition. Attackers can send an IKE packet with more than 57 valid payloads to overflow an internal buffer.

Extended Description

The Cisco VPN Client is prone to a remotely exploitable buffer overflow condition. It is possible to trigger this condition by sending malformed IKE packets to the client. The overflow is known to occur when the client attempts to process an IKE packet with more than 57 valid payloads. It may be possible to exploit this condition to execute arbitrary code with the privileges of the client. It is possible that exploitation of this vulnerability may affect availability of the client, resulting in a denial of service condition. This vulnerability affects versions of the client on all platforms.

Affected Products

  • Cisco VPN Client for Linux 3.5.1
  • Cisco VPN Client for Linux 3.5.2
  • Cisco VPN Client for Mac OS X 3.5.1
  • Cisco VPN Client for Mac OS X 3.5.2
  • Cisco VPN Client for Solaris 3.5.1
  • Cisco VPN Client for Solaris 3.5.2
  • Cisco VPN Client for Windows 3.5.1
  • Cisco VPN Client for Windows 3.5.2

References

  • BugTraq: 5443
  • CVE: CVE-2002-0852
  • URL: http://www.kb.cert.org/vuls/id/287771
  • URL: http://www.securityfocus.com/bid/5441
  • URL: http://www.ietf.org/rfc/rfc2409.txt

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out