Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

IKE:OPENSWAN-DPD-NULL-PTR-DOS

Severity

Medium

Recommended

No

Recommended Action

Drop

Category

IKE

Keywords

Openswan and Strongswan Dead Peer Detection Null Pointer Dereference Denial of Service

Release Date

2013/03/05

Update Number

2240

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

IKE: Openswan and Strongswan Dead Peer Detection Null Pointer Dereference Denial of Service


This signature detects attempts to exploit a known vulnerability against Openswan and Strongswan IPsec. A successful attack can result in a denial-of-service condition. This is an old issue and newer versions of the applications are unaffected by this vulnerability.

Extended Description

Openswan and strongSwan are prone to a remote denial-of-service vulnerability because they fail to properly handle certain Dead Peer Detection (DPD) packets. Attackers can exploit this issue to crash the pluto IKE daemon, denying access to legitimate users. Versions *prior to* the following are affected: Openswan 2.6.21 Openswan 2.4.14 strongSwan 4.2.14 strongSwan 2.8.9

Affected Products

  • Debian Linux 4.0
  • Debian Linux 4.0 Alpha
  • Debian Linux 4.0 Amd64
  • Debian Linux 4.0 Arm
  • Debian Linux 4.0 Armel
  • Debian Linux 4.0 Hppa
  • Debian Linux 4.0 Ia-32
  • Debian Linux 4.0 Ia-64
  • Debian Linux 4.0 M68k
  • Debian Linux 4.0 Mips
  • Debian Linux 4.0 Mipsel
  • Debian Linux 4.0 Powerpc
  • Debian Linux 4.0 S/390
  • Debian Linux 4.0 Sparc
  • Debian Linux 5.0
  • Debian Linux 5.0 Alpha
  • Debian Linux 5.0 Amd64
  • Debian Linux 5.0 Arm
  • Debian Linux 5.0 Armel
  • Debian Linux 5.0 Hppa
  • Debian Linux 5.0 Ia-32
  • Debian Linux 5.0 Ia-64
  • Debian Linux 5.0 M68k
  • Debian Linux 5.0 Mips
  • Debian Linux 5.0 Mipsel
  • Debian Linux 5.0 Powerpc
  • Debian Linux 5.0 S/390
  • Debian Linux 5.0 Sparc
  • Gentoo Linux
  • Openswan 1.0.4
  • Openswan 1.0.5
  • Openswan 1.0.6
  • Openswan 1.0.7
  • Openswan 1.0.8
  • Openswan 1.0.9
  • Openswan 2.1.1
  • Openswan 2.1.2
  • Openswan 2.1.4
  • Openswan 2.1.5
  • Openswan 2.1.6
  • Openswan 2.2.0
  • Openswan 2.3.0
  • Openswan 2.3.1
  • Openswan 2.4.0
  • Openswan 2.4.13
  • Openswan 2.4.2
  • Openswan 2.4.4
  • Openswan 2.6.16
  • Openswan 2.6.20
  • Red Hat Enterprise Linux 5 Server
  • Red Hat Enterprise Linux Desktop 5 Client
  • Red Hat Fedora 10
  • strongSwan 2.1.3
  • strongSwan 2.8.8
  • strongSwan 4.2.13
  • strongSwan 4.2.6
  • strongSwan 4.2.7
  • SuSE openSUSE 10.3
  • SuSE openSUSE 11.0
  • SuSE openSUSE 11.1
  • SuSE SUSE Linux Enterprise Server 10
  • SuSE SUSE Linux Enterprise Server 11

References

  • BugTraq: 34296
  • CVE: CVE-2009-0790

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out