CVE-2005-0039

N/A Unknown
Published: May 10, 2005 Modified: April 16, 2026
View on NVD

Description

Certain configurations of IPsec, when using Encapsulating Security Payload (ESP) in tunnel mode, integrity protection at a higher layer, or Authentication Header (AH), allow remote attackers to decrypt IPSec communications by modifying the outer packet in ways that cause plaintext data from the inner packet to be returned in ICMP messages, as demonstrated using bit-flipping attacks and (1) Destination Address Rewriting, (2) a modified header length that causes portions of the packet to be interpreted as IP Options, or (3) a modified protocol field and source address.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.kb.cert.org/vuls/id/302220
Source: cve@mitre.org
US Government Resource
http://marc.info/?l=bugtraq&m=111566201610350&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/17938
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1015320
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/302220
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.niscc.gov.uk/niscc/docs/al-20050509-00386.html?lang=en
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/407774
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/13562
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2005/0507
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2005/2806
Source: af854a3a-2127-422b-91ae-364da2661108

18 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.9%
83th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

nissc