A "programming error" in fast_ipsec in FreeBSD 4.8-RELEASE through 6.1-STABLE and NetBSD 2 through 3 does not properly update the sequence number associated with a Security Association, which allows packets to pass sequence number checks and allows remote attackers to capture IPSec packets and conduct replay attacks.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:07
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:11.ipsec.asc - Patch, Vendor Advisory | |
References | () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-011.txt.asc - | |
References | () http://secunia.com/advisories/19366 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1015809 - | |
References | () http://www.osvdb.org/24068 - | |
References | () http://www.securityfocus.com/bid/17191 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25398 - |
Information
Published : 2006-03-23 11:06
Updated : 2025-04-03 01:03
NVD link : CVE-2006-0905
Mitre link : CVE-2006-0905
CVE.ORG link : CVE-2006-0905
JSON object : View
Products Affected
netbsd
- netbsd
freebsd
- freebsd
CWE