>
> *************************
> Widely Deployed Software
> *************************
>
>
> **********************************************************************
>
> (2) HIGH: Multiple Vendor IPSec IKE Implementation Vulnerabilities
> Affected:
> Cisco, Juniper, Sun, HP, Nortel, CheckPoint and OpenSWAN products
>
> Description: IP Security (IPSec) protocol suite is a standard for
> securing communications by encrypting and/or authenticating all the IP
> packets. Internet Key Exchange (IKE) is a part of the IPSec protocol
> that provides automated key management and peer authentication. The
> IPSec protocols are used for establishing VPN tunnels. Multiple
> vulnerabilities have been reported in the IPSec IKE protocol
> implementation by various vendors. The flaws were discovered using the
> IKE PROTOS test suite that stresses a vendor's IKE implementation by
> sending malformed IKE messages. Successful exploitation of these flaws
> may cause a denial-of-service or result in arbitrary code execution on
> the system/device supporting the IPsec protocol. In many VPN set-ups,
> the default port 500/udp is used for IPsec negotiation, which makes it
> easier to spoof a malformed IKE packet. The test suite is publicly
> available.
>
> Status: Cisco, Juniper, Sun, HP, Nortel, CheckPoint, OpenSWAN have
> confirmed the vulnerability and released patches. Other vendors are
> still investigating if their products are affected.
>
> Council Site Actions: Only a few council sites responded to this item.
> More information has been published since we sent it out to
> the council
> sites. Two sites plan to deploy the patches for their Cisco equipment
> during their next regularly scheduled system update process.
> The other
> site has confirmed vulnerable platforms, but is still in the
> process or
> waiting on confirmation from other vendors.
>
> References:
> NISCC UK Advisory
>
> CERT Advisory
>
> PROTOS Test Suite by University of OULU, Finland
>
> Cisco Advisory
>
> IKE RFC
>
> SecurityFocus BIDs
>
>
>
>
>
>
>
>
> ****************************************************************
>
> 05.46.30 CVE: Not Available
> Platform: Cross Platform
> Title: Multiple Vendor Antivirus Products Obscured File Name Scan
> Evasion
> Description: Multiple antivirus products do not properly identify
> potentially malicious files when their names contain certain
> non-printing characters. Specifically, files with names containing
> characters with ASCII values 0xC0, 0xD7, 0xBA, 0xDC may evade
> detection.
> Ref:
> ______________________________________________________________________