{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"OpenBSD 3.4 et versions ant\u00e9rieures ;","product":{"name":"OpenBSD","vendor":{"name":"OpenBSD","scada":false}}},{"description":"OpenBSD-current du 17 mars 2004 et versions ant\u00e9rieures.","product":{"name":"OpenBSD","vendor":{"name":"OpenBSD","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nisakmpd est un service de gestion des clefs IKE. isakmpd g\u00e8re notamment\nles associations de s\u00e9curit\u00e9 (SA ou Security Associations) pour du\ntrafic r\u00e9seau chiffr\u00e9 et/ou authentifi\u00e9 (IPSEC).\n\n  \nAu moyen de paquets habilement constitu\u00e9s, un utilisateur mal\nintentionn\u00e9 peut r\u00e9aliser un d\u00e9ni de service par arr\u00eat intempestif du\nservice ou consommation excessive des ressources du syst\u00e8mes (m\u00e9moire,\nCPU).\n\n## Solution\n\nPour OpenBSD version 3.4, appliquer le correctif disponible \u00e0 cette\nadresse :\n\n    ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/015_isakmpd2.patch\n\nPour OpenBSD version 3.3, appliquer le correctif disponible \u00e0 cette\nadresse :\n\n    ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/020_isakmpd2.patch\n","cves":[],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 OpenBSD #015 du 17 mars 2004 :","url":"http://www.openbsd.org/errata.html#isakmpd2"},{"title":"Avis de s\u00e9curit\u00e9 FreeBSD du 31 mars 2004 :","url":"http://www.vuxml.org/freebsd/"},{"title":"Mise \u00e0 jour de s\u00e9curit\u00e9 du paquetage NetBSD isakmpd :","url":"ftp://ftp.netbsd.org/pub/NetBSD/packages/distfiles/vulnerabilities"}],"reference":"CERTA-2004-AVI-100","revisions":[{"description":"version initiale.","revision_date":"2004-03-24T00:00:00.000000"},{"description":"ajout r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 FreeBSD et NetBSD.","revision_date":"2004-05-12T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans le service isakmpd peuvent\n\u00eatre exploit\u00e9es par un utilisateur mal intentionn\u00e9 afin de r\u00e9aliser un\nd\u00e9ni de service sur la plate-forme vuln\u00e9rable.\n","title":"Multiples vuln\u00e9rabilit\u00e9s de isakmpd sous OpenBSD","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 R7-0018 de Rapid7","url":"http://www.rapid7.com/advisories/R7-0018.html"}]}
