| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.5 | $0-$5k | 0.00 |
Summary
A vulnerability described as problematic has been identified in Red Hat Enterprise Linux up to 4. This affects an unknown function of the component IPsec. Executing a manipulation can lead to config. This vulnerability appears as CVE-2008-1198. There is no available exploit.
Details
A vulnerability has been found in Red Hat Enterprise Linux up to 4 (Operating System) and classified as critical. This vulnerability affects an unknown code block of the component IPsec. The manipulation with an unknown input leads to a config vulnerability. The CWE definition for the vulnerability is CWE-16. As an impact it is known to affect confidentiality. CVE summarizes:
The default IPSec ifup script in Red Hat Enterprise Linux 3 through 5 configures racoon to use aggressive IKE mode instead of main IKE mode, which makes it easier for remote attackers to conduct brute force attacks by sniffing an unencrypted preshared key (PSK) hash.
The weakness was presented 03/06/2008 as Bug 435274 as confirmed bug report (Bugzilla). The advisory is shared for download at bugzilla.redhat.com. This vulnerability was named CVE-2008-1198 since 03/06/2008. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1592.004.
The vulnerability scanner Nessus provides a plugin with the ID 68483 (Oracle Linux 5 : initscripts (ELSA-2012-0312)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Oracle Linux Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 119977 (Red Hat Update for initscripts (RHSA-2012:0312)).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at X-Force (41053), Tenable (68483), Secunia (SA48045†), SecurityTracker (ID 1019563†) and Vulnerability Center (SBV-34621†). VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.redhat.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 7.5
VulDB Base Score: 7.5
VulDB Temp Score: 7.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: ConfigCWE: CWE-16
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 68483
Nessus Name: Oracle Linux 5 : initscripts (ELSA-2012-0312)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
OpenVAS ID: 870555
OpenVAS Name: RedHat Update for initscripts RHSA-2012:0312-03
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
03/06/2008 🔍03/06/2008 🔍
03/06/2008 🔍
03/06/2008 🔍
03/07/2008 🔍
03/13/2012 🔍
07/12/2013 🔍
03/16/2015 🔍
06/01/2025 🔍
Sources
Vendor: redhat.comAdvisory: Bug 435274
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2008-1198 (🔍)
GCVE (CVE): GCVE-0-2008-1198
GCVE (VulDB): GCVE-100-41368
OVAL: 🔍
X-Force: 41053
Secunia: 48045
SecurityTracker: 1019563 - Red Hat Enterprise Linux Default IPSec Script Uses IKE Aggressive Mode
Vulnerability Center: 34621 - RedHat Enterprise Linux 3-5 IPSec ifup IKE Mode Misconfiguration Allows Brute Force Attacks, Medium
Entry
Created: 03/16/2015 13:43Updated: 06/01/2025 04:37
Changes: 03/16/2015 13:43 (60), 04/10/2017 11:42 (13), 07/31/2021 09:39 (3), 12/23/2024 09:48 (15), 06/01/2025 04:37 (4)
Complete: 🔍
Cache ID: 216:45E:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.