{"vuid":"VU#524497","idnumber":"524497","name":"isakmpd crashes when handling ISAKMP packets with malformed \"Delete Payload\"","keywords":["Rapid7","Striker","OpenBSD","isakmpd","ISAKMP"],"overview":"A vulnerability exists in the isakmpd that could allow a remote attacker to cause a denial of service.","clean_desc":"The OpenBSD isakmpd establishes security associations for encrypted and authenticated (IPsec) network traffic. It implements the Internet Security Association and Key Management Protocol (ISAKMP) and Internet Key Exchange (IKE) protocol. The ISAKMP standard specifies: The Delete Payload contains a protocol-specific security association identifier that the sender has removed from its security association database and is, therefore, no longer valid. [...] It is possible to send multiple Security Parameter Index(es) (SPIs) in a Delete payload [...] To this end, the format of the \"Delete Payload\" contains a \"# of SPIs\" field, specified as two octets. A flaw exists in the way that isakmpd handles malformed ISAKMP packets specifying an overly large number of SPIs for deletion. Such malformed packets could cause isakmpd to read out of bounds and crash.","impact":"A remote attacker could cause the isakmpd service to crash. Subsequent IPsec-enabled communications may be disrupted as a result.","resolution":"Apply a patch from the vendor Patches have been released to address this issue. Please see the Systems Affected section of this document for more details.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by \nRapid7\n using their Striker test suite.","author":"This document was written by Chad R Dougherty based on information published in Rapid7 Advisory R7-0018.","public":[],"cveids":["CVE-2004-0221"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-08-20T20:05:17Z","publicdate":"2004-03-19T00:00:00Z","datefirstpublished":"2004-08-27T13:26:54Z","dateupdated":"2004-08-27T13:26:56Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"3","cam_easeofexploitation":"8","cam_attackeraccessrequired":"15","cam_scorecurrent":"1.6875","cam_scorecurrentwidelyknown":"2.025","cam_scorecurrentwidelyknownexploited":"3.375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.6875,"vulnote":null}