VAR-200209-0033
Vulnerability from variot - Updated: 2025-04-03 19:52Cisco Virtual Private Network (VPN) Client 3.5.4 and earlier allows remote attackers to cause a denial of service (CPU consumption) via a packet with a zero-length payload. Internet Key Exchange (IKE) implementations from several vendors contain buffer overflows and denial-of-service conditions. The buffer overflow vulnerabilities could permit an attacker to execute arbitrary code on a vulnerable system. This is reported to cause the daemon to crash. This issue may be related to the multiple IKE implementation vulnerabilities described in CERT/CC Vulnerability Note VU#287771. Other vendor products are reported to be affected by similar issues. There are currently not enough details available to determine if PGPFreeware is affected by any of these specific issues. This issue was reported in PGPFreeware 7.03 running on Windows NT 4.0 SP6. The Cisco VPN Client is prone to a remotely exploitable buffer overflow condition. It is possible to trigger this condition by sending malformed IKE packets to the client. The overflow occurs when the Security Parameter Index payload of the IKE packet is longer than 16 bytes in length. It is possible that exploitation of this vulnerability may affect availability of the client, resulting in a denial of service condition. This issue is reported to be exploitable when the client software is operating in Aggressive Mode during a phase 1 IKE exchange. This vulnerability affects versions of the client on all platforms. When vulnerable clients receive a specific IKE packet with a zero length payload, the VPN client will consume all available processor time. The Cisco bug ID for these vulnerabilities is CSCdy26045
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200209-0033",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vpn client",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "3.5.2"
},
{
"model": "vpn client",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "3.5.1"
},
{
"model": "vpn client for windows",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.5.1"
},
{
"model": "vpn client for solaris",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.5.2"
},
{
"model": "vpn client for solaris",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.5.1"
},
{
"model": "vpn client for mac os",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "x3.5.2"
},
{
"model": "vpn client for mac os",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "x3.5.1"
},
{
"model": "vpn client for linux",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.5.2"
},
{
"model": "vpn client for linux",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3.5.1"
},
{
"model": "vpn client for windows",
"scope": "ne",
"trust": 0.9,
"vendor": "cisco",
"version": "3.6"
},
{
"model": "vpn client for solaris",
"scope": "ne",
"trust": 0.9,
"vendor": "cisco",
"version": "3.6"
},
{
"model": "vpn client for mac os",
"scope": "ne",
"trust": 0.9,
"vendor": "cisco",
"version": "x3.6"
},
{
"model": "vpn client for linux",
"scope": "ne",
"trust": 0.9,
"vendor": "cisco",
"version": "3.6"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "netscreen",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "network associates",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "openbsd",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "pgp",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "safenet",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "sonicwall",
"version": null
},
{
"model": "vpn client for windows",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3.5.2"
},
{
"model": "openbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "openbsd",
"version": "3.1"
},
{
"model": "openbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "openbsd",
"version": "3.0"
},
{
"model": "netscreen-remote vpn client",
"scope": "eq",
"trust": 0.3,
"vendor": "netscreen",
"version": "8.0"
},
{
"model": "netscreen-remote security client",
"scope": "eq",
"trust": 0.3,
"vendor": "netscreen",
"version": "8.0"
},
{
"model": "netscreen-remote vpn client",
"scope": "ne",
"trust": 0.3,
"vendor": "netscreen",
"version": "8.1"
},
{
"model": "netscreen-remote security client",
"scope": "ne",
"trust": 0.3,
"vendor": "netscreen",
"version": "8.1"
},
{
"model": "associates pgp freeware",
"scope": "eq",
"trust": 0.3,
"vendor": "network",
"version": "7.0.3"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#287771"
},
{
"db": "BID",
"id": "5589"
},
{
"db": "BID",
"id": "5668"
},
{
"db": "BID",
"id": "5449"
},
{
"db": "BID",
"id": "5441"
},
{
"db": "BID",
"id": "5443"
},
{
"db": "BID",
"id": "5440"
},
{
"db": "CNNVD",
"id": "CNNVD-200209-021"
},
{
"db": "NVD",
"id": "CVE-2002-0853"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Published in a Cisco Security Advisory. CERT/CC credits Anton Rager of Avaya Communications with discovery.",
"sources": [
{
"db": "BID",
"id": "5441"
},
{
"db": "BID",
"id": "5443"
},
{
"db": "BID",
"id": "5440"
}
],
"trust": 0.9
},
"cve": "CVE-2002-0853",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2002-0853",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-5244",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2002-0853",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#287771",
"trust": 0.8,
"value": "1.03"
},
{
"author": "CNNVD",
"id": "CNNVD-200209-021",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-5244",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#287771"
},
{
"db": "VULHUB",
"id": "VHN-5244"
},
{
"db": "CNNVD",
"id": "CNNVD-200209-021"
},
{
"db": "NVD",
"id": "CVE-2002-0853"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Virtual Private Network (VPN) Client 3.5.4 and earlier allows remote attackers to cause a denial of service (CPU consumption) via a packet with a zero-length payload. Internet Key Exchange (IKE) implementations from several vendors contain buffer overflows and denial-of-service conditions. The buffer overflow vulnerabilities could permit an attacker to execute arbitrary code on a vulnerable system. This is reported to cause the daemon to crash. \nThis issue may be related to the multiple IKE implementation vulnerabilities described in CERT/CC Vulnerability Note VU#287771. \nOther vendor products are reported to be affected by similar issues. There are currently not enough details available to determine if PGPFreeware is affected by any of these specific issues. \nThis issue was reported in PGPFreeware 7.03 running on Windows NT 4.0 SP6. The Cisco VPN Client is prone to a remotely exploitable buffer overflow condition. It is possible to trigger this condition by sending malformed IKE packets to the client. The overflow occurs when the Security Parameter Index payload of the IKE packet is longer than 16 bytes in length. It is possible that exploitation of this vulnerability may affect availability of the client, resulting in a denial of service condition. \nThis issue is reported to be exploitable when the client software is operating in Aggressive Mode during a phase 1 IKE exchange. \nThis vulnerability affects versions of the client on all platforms. \nWhen vulnerable clients receive a specific IKE packet with a zero length payload, the VPN client will consume all available processor time. The Cisco bug ID for these vulnerabilities is CSCdy26045",
"sources": [
{
"db": "NVD",
"id": "CVE-2002-0853"
},
{
"db": "CERT/CC",
"id": "VU#287771"
},
{
"db": "BID",
"id": "5589"
},
{
"db": "BID",
"id": "5668"
},
{
"db": "BID",
"id": "5449"
},
{
"db": "BID",
"id": "5441"
},
{
"db": "BID",
"id": "5443"
},
{
"db": "BID",
"id": "5440"
},
{
"db": "VULHUB",
"id": "VHN-5244"
}
],
"trust": 3.33
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#287771",
"trust": 4.0
},
{
"db": "BID",
"id": "5440",
"trust": 2.8
},
{
"db": "NVD",
"id": "CVE-2002-0853",
"trust": 1.7
},
{
"db": "BID",
"id": "5668",
"trust": 1.1
},
{
"db": "BID",
"id": "5449",
"trust": 1.1
},
{
"db": "BID",
"id": "5443",
"trust": 1.1
},
{
"db": "BID",
"id": "5441",
"trust": 1.1
},
{
"db": "CNNVD",
"id": "CNNVD-200209-021",
"trust": 0.7
},
{
"db": "XF",
"id": "9821",
"trust": 0.6
},
{
"db": "CISCO",
"id": "20020812 CISCO VPN CLIENT MULTIPLE VULNERABILITIES",
"trust": 0.6
},
{
"db": "BID",
"id": "5589",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-5244",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#287771"
},
{
"db": "VULHUB",
"id": "VHN-5244"
},
{
"db": "BID",
"id": "5589"
},
{
"db": "BID",
"id": "5668"
},
{
"db": "BID",
"id": "5449"
},
{
"db": "BID",
"id": "5441"
},
{
"db": "BID",
"id": "5443"
},
{
"db": "BID",
"id": "5440"
},
{
"db": "CNNVD",
"id": "CNNVD-200209-021"
},
{
"db": "NVD",
"id": "CVE-2002-0853"
}
]
},
"id": "VAR-200209-0033",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-5244"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-03T19:52:21.463000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2002-0853"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.2,
"url": "http://www.kb.cert.org/vuls/id/287771"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/5440"
},
{
"trust": 1.7,
"url": "http://www.cisco.com/warp/public/707/vpnclient-multiple-vuln-pub.shtml"
},
{
"trust": 1.7,
"url": "http://www.iss.net/security_center/static/9821.php"
},
{
"trust": 0.8,
"url": "http://www.ietf.org/html.charters/ipsec-charter.html"
},
{
"trust": 0.8,
"url": "http://www.ietf.org/rfc/rfc2408.txt"
},
{
"trust": 0.8,
"url": "http://www.ietf.org/rfc/rfc2409.txt"
},
{
"trust": 0.8,
"url": "http://www.ietf.org/rfc/rfc2412.txt"
},
{
"trust": 0.8,
"url": "http://www.vpnc.org/"
},
{
"trust": 0.8,
"url": "http://online.securityfocus.com/bid/5440"
},
{
"trust": 0.8,
"url": "http://online.securityfocus.com/bid/5441"
},
{
"trust": 0.8,
"url": "http://online.securityfocus.com/bid/5443"
},
{
"trust": 0.8,
"url": "http://www.securityfocus.com/bid/5449"
},
{
"trust": 0.8,
"url": "http://www.securityfocus.com/bid/5668"
},
{
"trust": 0.8,
"url": "http://ikecrack.sourceforge.net/"
},
{
"trust": 0.8,
"url": "http://www.nta-monitor.com/ike-scan/"
},
{
"trust": 0.3,
"url": "http://www.openbsd.org/errata.html#isakmpd"
},
{
"trust": 0.3,
"url": "http://www.netscreen.com/support/alerts/9_6_02.htm"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#287771"
},
{
"db": "VULHUB",
"id": "VHN-5244"
},
{
"db": "BID",
"id": "5589"
},
{
"db": "BID",
"id": "5668"
},
{
"db": "BID",
"id": "5449"
},
{
"db": "BID",
"id": "5441"
},
{
"db": "BID",
"id": "5443"
},
{
"db": "BID",
"id": "5440"
},
{
"db": "CNNVD",
"id": "CNNVD-200209-021"
},
{
"db": "NVD",
"id": "CVE-2002-0853"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#287771"
},
{
"db": "VULHUB",
"id": "VHN-5244"
},
{
"db": "BID",
"id": "5589"
},
{
"db": "BID",
"id": "5668"
},
{
"db": "BID",
"id": "5449"
},
{
"db": "BID",
"id": "5441"
},
{
"db": "BID",
"id": "5443"
},
{
"db": "BID",
"id": "5440"
},
{
"db": "CNNVD",
"id": "CNNVD-200209-021"
},
{
"db": "NVD",
"id": "CVE-2002-0853"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2002-08-12T00:00:00",
"db": "CERT/CC",
"id": "VU#287771"
},
{
"date": "2002-09-05T00:00:00",
"db": "VULHUB",
"id": "VHN-5244"
},
{
"date": "2002-07-05T00:00:00",
"db": "BID",
"id": "5589"
},
{
"date": "2002-09-07T00:00:00",
"db": "BID",
"id": "5668"
},
{
"date": "2002-08-12T00:00:00",
"db": "BID",
"id": "5449"
},
{
"date": "2002-08-12T00:00:00",
"db": "BID",
"id": "5441"
},
{
"date": "2002-08-12T00:00:00",
"db": "BID",
"id": "5443"
},
{
"date": "2002-08-12T00:00:00",
"db": "BID",
"id": "5440"
},
{
"date": "2002-08-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200209-021"
},
{
"date": "2002-09-05T04:00:00",
"db": "NVD",
"id": "CVE-2002-0853"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-02-09T00:00:00",
"db": "CERT/CC",
"id": "VU#287771"
},
{
"date": "2008-09-10T00:00:00",
"db": "VULHUB",
"id": "VHN-5244"
},
{
"date": "2002-07-05T00:00:00",
"db": "BID",
"id": "5589"
},
{
"date": "2002-09-07T00:00:00",
"db": "BID",
"id": "5668"
},
{
"date": "2002-08-12T00:00:00",
"db": "BID",
"id": "5449"
},
{
"date": "2002-08-12T00:00:00",
"db": "BID",
"id": "5441"
},
{
"date": "2002-08-12T00:00:00",
"db": "BID",
"id": "5443"
},
{
"date": "2002-08-12T00:00:00",
"db": "BID",
"id": "5440"
},
{
"date": "2005-05-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200209-021"
},
{
"date": "2025-04-03T01:03:51.193000",
"db": "NVD",
"id": "CVE-2002-0853"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "5589"
},
{
"db": "BID",
"id": "5668"
},
{
"db": "BID",
"id": "5449"
},
{
"db": "BID",
"id": "5441"
},
{
"db": "BID",
"id": "5443"
},
{
"db": "BID",
"id": "5440"
}
],
"trust": 1.8
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple vendors\u0027 Internet Key Exchange (IKE) implementations do not properly handle IKE response packets",
"sources": [
{
"db": "CERT/CC",
"id": "VU#287771"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Boundary Condition Error",
"sources": [
{
"db": "BID",
"id": "5668"
},
{
"db": "BID",
"id": "5449"
},
{
"db": "BID",
"id": "5441"
},
{
"db": "BID",
"id": "5443"
}
],
"trust": 1.2
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.