Note: This is an archival copy of Security Sun Alert 201142 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1000861.1.
Solaris 9 Operating System
Solaris 10 Operating System
Date of Workaround Release
Date of Resolved Release
A remote privileged user may be able to attempt an IKE exchange using a malformed payload, which could cause the in.iked(1M) process to crash, causing a Denial of Service (DoS) of IPSec key management services.
This issue is revealed by the test suite which is described in NISCC vulnerability #273756, which is available at http://www.uniras.gov.uk/niscc/docs/br-20051114-01013.html?lang=en
This issue can occur in the following releases:
To determine if the in.iked(1M) is running on a system, the following command can be run:
# pgrep -l in.iked 368 in.iked
If this issue has been exploited, the IKE daemon would no longer be running. To determine that the IKE (in.iked(1M)) daemon is NOT running on a system, the following command can be run:
$ pgrep in.iked || echo "in.iked not running"
There is no workaround. Please see the "Resolution" section below.
This issue is addressed in the following releases:
This solution has no attachment