Show filters
22 Total Results
Displaying 11-20 of 22
Sort by:
Attacker Value
Unknown
CVE-2019-10155
Disclosure Date: June 12, 2019 (last updated November 08, 2023)
The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29.
0
Attacker Value
Unknown
CVE-2019-12312
Disclosure Date: May 24, 2019 (last updated November 27, 2024)
In Libreswan 3.27 an assertion failure can lead to a pluto IKE daemon restart. An attacker can trigger a NULL pointer dereference by initiating an IKEv2 IKE_SA_INIT exchange, followed by a bogus INFORMATIONAL exchange instead of the normallly expected IKE_AUTH exchange. This affects send_v2N_spi_response_from_state() in programs/pluto/ikev2_send.c that will then trigger a NULL pointer dereference leading to a restart of libreswan.
0
Attacker Value
Unknown
CVE-2016-5391
Disclosure Date: June 13, 2017 (last updated November 26, 2024)
libreswan before 3.18 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto daemon restart).
0
Attacker Value
Unknown
CVE-2016-5361
Disclosure Date: June 16, 2016 (last updated November 25, 2024)
programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial-responder states, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed UDP packet. NOTE: the original behavior complies with the IKEv1 protocol, but has a required security update from the libreswan vendor; as of 2016-06-10, it is expected that several other IKEv1 implementations will have vendor-required security updates, with separate CVE IDs assigned to each.
0
Attacker Value
Unknown
CVE-2016-3071
Disclosure Date: April 18, 2016 (last updated November 25, 2024)
Libreswan 3.16 might allow remote attackers to cause a denial of service (daemon restart) via an IKEv2 aes_xcbc transform.
0
Attacker Value
Unknown
CVE-2015-3240
Disclosure Date: November 09, 2015 (last updated October 05, 2023)
The pluto IKE daemon in libreswan before 3.15 and Openswan before 2.6.45, when built with NSS, allows remote attackers to cause a denial of service (assertion failure and daemon restart) via a zero DH g^x value in a KE payload in a IKE packet.
0
Attacker Value
Unknown
CVE-2015-3204
Disclosure Date: July 01, 2015 (last updated October 05, 2023)
libreswan 3.9 through 3.12 allows remote attackers to cause a denial of service (daemon restart) via an IKEv1 packet with (1) unassigned bits set in the IPSEC DOI value or (2) the next payload value set to ISAKMP_NEXT_SAK.
0
Attacker Value
Unknown
CVE-2013-6467
Disclosure Date: January 26, 2014 (last updated October 05, 2023)
Libreswan 3.7 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.
0
Attacker Value
Unknown
CVE-2013-7294
Disclosure Date: January 16, 2014 (last updated October 05, 2023)
The ikev2parent_inI1outR1 function in pluto/ikev2_parent.c in libreswan before 3.7 allows remote attackers to cause a denial of service (restart) via an IKEv2 I1 notification without a KE payload.
0
Attacker Value
Unknown
CVE-2013-7283
Disclosure Date: January 09, 2014 (last updated October 05, 2023)
Race condition in the libreswan.spec files for Red Hat Enterprise Linux (RHEL) and Fedora packages in libreswan 3.6 has unspecified impact and attack vectors, involving the /var/tmp/libreswan-nss-pwd temporary file.
0