// For flags

CVE-2002-0666

 

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors.

Implementaciones de IPSEC, incluyendo FreeS/WAN y KAME no calculan adecuadamente la longitud de los datos de autenticaciĆ³n, lo que permite a atacantes remotos causar una denegaciĆ³n de servicio (kernel panic) mediante paquetes Encapsulating Security Payload (EPS) cortos falsificados, lo que resulta en errores de enteros sin signos.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2002-07-08 CVE Reserved
  • 2002-10-25 CVE Published
  • 2024-03-04 EPSS Updated
  • 2024-08-08 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Frees Wan
Search vendor "Frees Wan"
Frees Wan
Search vendor "Frees Wan" for product "Frees Wan"
1.9
Search vendor "Frees Wan" for product "Frees Wan" and version "1.9"
-
Affected
Frees Wan
Search vendor "Frees Wan"
Frees Wan
Search vendor "Frees Wan" for product "Frees Wan"
1.9.1
Search vendor "Frees Wan" for product "Frees Wan" and version "1.9.1"
-
Affected
Frees Wan
Search vendor "Frees Wan"
Frees Wan
Search vendor "Frees Wan" for product "Frees Wan"
1.9.2
Search vendor "Frees Wan" for product "Frees Wan" and version "1.9.2"
-
Affected
Frees Wan
Search vendor "Frees Wan"
Frees Wan
Search vendor "Frees Wan" for product "Frees Wan"
1.9.3
Search vendor "Frees Wan" for product "Frees Wan" and version "1.9.3"
-
Affected
Frees Wan
Search vendor "Frees Wan"
Frees Wan
Search vendor "Frees Wan" for product "Frees Wan"
1.9.4
Search vendor "Frees Wan" for product "Frees Wan" and version "1.9.4"
-
Affected
Frees Wan
Search vendor "Frees Wan"
Frees Wan
Search vendor "Frees Wan" for product "Frees Wan"
1.9.5
Search vendor "Frees Wan" for product "Frees Wan" and version "1.9.5"
-
Affected
Frees Wan
Search vendor "Frees Wan"
Frees Wan
Search vendor "Frees Wan" for product "Frees Wan"
1.9.6
Search vendor "Frees Wan" for product "Frees Wan" and version "1.9.6"
-
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.2
Search vendor "Apple" for product "Mac Os X" and version "10.2"
-
Affected
Apple
Search vendor "Apple"
Mac Os X Server
Search vendor "Apple" for product "Mac Os X Server"
10.2
Search vendor "Apple" for product "Mac Os X Server" and version "10.2"
-
Affected
Freebsd
Search vendor "Freebsd"
Freebsd
Search vendor "Freebsd" for product "Freebsd"
4.6
Search vendor "Freebsd" for product "Freebsd" and version "4.6"
-
Affected
Freebsd
Search vendor "Freebsd"
Freebsd
Search vendor "Freebsd" for product "Freebsd"
4.6
Search vendor "Freebsd" for product "Freebsd" and version "4.6"
release
Affected
Freebsd
Search vendor "Freebsd"
Freebsd
Search vendor "Freebsd" for product "Freebsd"
4.6
Search vendor "Freebsd" for product "Freebsd" and version "4.6"
stable
Affected
Netbsd
Search vendor "Netbsd"
Netbsd
Search vendor "Netbsd" for product "Netbsd"
1.5
Search vendor "Netbsd" for product "Netbsd" and version "1.5"
-
Affected
Netbsd
Search vendor "Netbsd"
Netbsd
Search vendor "Netbsd" for product "Netbsd"
1.5
Search vendor "Netbsd" for product "Netbsd" and version "1.5"
sh3
Affected
Netbsd
Search vendor "Netbsd"
Netbsd
Search vendor "Netbsd" for product "Netbsd"
1.5
Search vendor "Netbsd" for product "Netbsd" and version "1.5"
x86
Affected
Netbsd
Search vendor "Netbsd"
Netbsd
Search vendor "Netbsd" for product "Netbsd"
1.5.1
Search vendor "Netbsd" for product "Netbsd" and version "1.5.1"
-
Affected
Netbsd
Search vendor "Netbsd"
Netbsd
Search vendor "Netbsd" for product "Netbsd"
1.5.2
Search vendor "Netbsd" for product "Netbsd" and version "1.5.2"
-
Affected
Netbsd
Search vendor "Netbsd"
Netbsd
Search vendor "Netbsd" for product "Netbsd"
1.5.3
Search vendor "Netbsd" for product "Netbsd" and version "1.5.3"
-
Affected
Netbsd
Search vendor "Netbsd"
Netbsd
Search vendor "Netbsd" for product "Netbsd"
1.6
Search vendor "Netbsd" for product "Netbsd" and version "1.6"
beta
Affected
Global Technology Associates
Search vendor "Global Technology Associates"
Gnat Box Firmware
Search vendor "Global Technology Associates" for product "Gnat Box Firmware"
3.1
Search vendor "Global Technology Associates" for product "Gnat Box Firmware" and version "3.1"
-
Affected
Global Technology Associates
Search vendor "Global Technology Associates"
Gnat Box Firmware
Search vendor "Global Technology Associates" for product "Gnat Box Firmware"
3.2
Search vendor "Global Technology Associates" for product "Gnat Box Firmware" and version "3.2"
-
Affected
Global Technology Associates
Search vendor "Global Technology Associates"
Gnat Box Firmware
Search vendor "Global Technology Associates" for product "Gnat Box Firmware"
3.3
Search vendor "Global Technology Associates" for product "Gnat Box Firmware" and version "3.3"
-
Affected
Nec
Search vendor "Nec"
Bluefire Ix1035 Router
Search vendor "Nec" for product "Bluefire Ix1035 Router"
*-
Affected
Nec
Search vendor "Nec"
Ix1010
Search vendor "Nec" for product "Ix1010"
*-
Affected
Nec
Search vendor "Nec"
Ix1011
Search vendor "Nec" for product "Ix1011"
*-
Affected
Nec
Search vendor "Nec"
Ix1020
Search vendor "Nec" for product "Ix1020"
*-
Affected
Nec
Search vendor "Nec"
Ix1050
Search vendor "Nec" for product "Ix1050"
*-
Affected
Nec
Search vendor "Nec"
Ix2010
Search vendor "Nec" for product "Ix2010"
*-
Affected