Show filters
18 Total Results
Displaying 1-10 of 18
Sort by:
Attacker Value
Unknown
CVE-2019-10155
Disclosure Date: June 12, 2019 (last updated November 08, 2023)
The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29.
0
Attacker Value
Unknown
CVE-2014-2037
Disclosure Date: November 26, 2014 (last updated October 05, 2023)
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.
0
Attacker Value
Unknown
CVE-2013-6466
Disclosure Date: January 26, 2014 (last updated October 05, 2023)
Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.
0
Attacker Value
Unknown
CVE-2013-2053
Disclosure Date: July 09, 2013 (last updated November 08, 2023)
Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.
0
Attacker Value
Unknown
CVE-2011-3380
Disclosure Date: November 17, 2011 (last updated October 04, 2023)
Openswan 2.6.29 through 2.6.35 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto IKE daemon crash) via an ISAKMP message with an invalid KEY_LENGTH attribute, which is not properly handled by the error handling function.
0
Attacker Value
Unknown
CVE-2011-4073
Disclosure Date: November 17, 2011 (last updated October 04, 2023)
Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions.
0
Attacker Value
Unknown
CVE-2011-2147
Disclosure Date: May 20, 2011 (last updated October 04, 2023)
Openswan 2.2.x does not properly restrict permissions for (1) /var/run/starter.pid, related to starter.c in the IPsec starter, and (2) /var/lock/subsys/ipsec, which allows local users to kill arbitrary processes by writing a PID to a file, or possibly bypass disk quotas by writing arbitrary data to a file, as demonstrated by files with 0666 permissions, a different vulnerability than CVE-2011-1784.
0
Attacker Value
Unknown
CVE-2010-3753
Disclosure Date: October 05, 2010 (last updated October 04, 2023)
programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.
0
Attacker Value
Unknown
CVE-2010-3302
Disclosure Date: October 05, 2010 (last updated October 04, 2023)
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a packet.
0
Attacker Value
Unknown
CVE-2010-3308
Disclosure Date: October 05, 2010 (last updated October 04, 2023)
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field.
0