Summary
The remote host is missing an update to isakmpd
announced via advisory DSA 1175-1.
A flaw has been found in isakmpd, OpenBSD's implementation of the Internet Key Exchange protocol, that caused Security Associations to be created with a replay window of 0 when isakmpd was acting as the responder during SA negotiation. This could allow an attacker to re-inject sniffed IPsec packets, which would not be checked against the replay counter.
Solution
For the stable distribution (sarge) this problem has been fixed in version 20041012-1sarge1
For the unstable distribution (sid) this problem has been fixed in version 20041012-4
We recommend that you upgrade your isakmpd package.
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201175-1
Severity
Classification
-
CVE CVE-2006-4436 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities