Internet Key Exchange (IKE) implementations from several vendors contain buffer overflows and denial-of-service conditions. The buffer overflow vulnerabilities could permit an attacker to execute arbitrary code on a vulnerable system.
The CERT/CC has received a report describing several vulnerabilities in different vendors' IKE implementations. The IKE protocol (RFC 2409) operates within the framework of the Internet Security Association and Key Management Protocol (ISAKMP, RFC 2408) and provides a way for nodes to authenticate each other and exchange keying material that is used to establish secure network services. IKE is commonly used by IPSec-based VPNs.
During an IKE exchange, some IKE implementations do not properly handle exceptional response packets. The report enumerates several cases:
An attacker who is able to send solicited IKE responses could execute arbitrary code with the privileges of the IKE service or cause a denial of service. The attacker must act as an IKE responder, so therefore must have control over the responder, the ability to spoof IKE response packets, or the ability to redirect the IKE initiator to a responder controlled by the attacker.
Upgrade or Patch
Cisco Systems Inc. Affected
Network Associates Affected
SonicWALL Inc. Affected
Apple Computer Inc. Not Affected
Clavister Not Affected
Cray Inc. Not Affected
FreeBSD Not Affected
Fujitsu Not Affected
Hewlett-Packard Company Not Affected
Hitachi Not Affected
IBM Not Affected
KAME Project Not Affected
Microsoft Corporation Not Affected
NEC Corporation Not Affected
NIST Not Affected
NetBSD Not Affected
Nortel Networks Not Affected
Red Hat Inc. Not Affected
SGI Not Affected
SSH Communications Security Not Affected
SuSE Inc. Not Affected
Sun Microsystems Inc. Not Affected
Data General Unknown
Guardian Digital Inc. Unknown
Sony Corporation Unknown
The SCO Group (SCO Linux) Unknown
Wind River Systems Inc. Unknown
The CERT/CC thanks Anton Rager of Avaya Security Consulting Services from Avaya, Inc. for reporting this vulnerability and providing information used in this document.
This document was written by Art Manion.
|Date First Published:||2002-08-12|
|Date Last Updated:||2004-02-09 19:44 UTC|