Internet Key Exchange (IKE) implementations from several vendors contain buffer overflows and denial-of-service conditions. The buffer overflow vulnerabilities could permit an attacker to execute arbitrary code on a vulnerable system.
The CERT/CC has received a report describing several vulnerabilities in different vendors' IKE implementations. The IKE protocol (RFC 2409) operates within the framework of the Internet Security Association and Key Management Protocol (ISAKMP, RFC 2408) and provides a way for nodes to authenticate each other and exchange keying material that is used to establish secure network services. IKE is commonly used by IPSec-based VPNs.
During an IKE exchange, some IKE implementations do not properly handle exceptional response packets. The report enumerates several cases:
An attacker who is able to send solicited IKE responses could execute arbitrary code with the privileges of the IKE service or cause a denial of service. The attacker must act as an IKE responder, so therefore must have control over the responder, the ability to spoof IKE response packets, or the ability to redirect the IKE initiator to a responder controlled by the attacker.
Upgrade or Patch
Upgrade or apply a patch to vulnerable IKE software as specified by your vendor.
Block or Restrict Access
Using a firewall or other packet filtering technology, block or restrict access to the IKE service, 500/udp. Note that blocking access will effectively disable an IPSec-based VPN that relies on IKE for key exchange.
Vendor| Status| Date Notified| Date Updated
Cisco Systems Inc.| | 08 May 2002| 09 Aug 2002
NetScreen| | -| 05 Feb 2003
Network Associates| | 08 May 2002| 10 Sep 2002
OpenBSD| | 02 Jul 2002| 05 Feb 2003
PGP| | 10 May 2002| 05 Sep 2002
SafeNet| | 13 May 2002| 20 Aug 2002
SonicWALL Inc.| | -| 01 Apr 2003
Apple Computer Inc.| | 02 Jul 2002| 06 Aug 2002
Clavister| | -| 05 Sep 2002
Cray Inc.| | 02 Jul 2002| 06 Aug 2002
FreeBSD| | 02 Jul 2002| 05 Sep 2002
Fujitsu| | 02 Jul 2002| 12 Aug 2002
Hewlett-Packard Company| | 02 Jul 2002| 05 Feb 2003
Hitachi| | -| 05 Sep 2002
IBM| | 02 Jul 2002| 11 Dec 2002
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
The CERT/CC thanks Anton Rager of Avaya Security Consulting Services from Avaya, Inc. for reporting this vulnerability and providing information used in this document.
This document was written by Art Manion.