VYPR

Libreswan

by Libreswan

Source repositories

CVEs (10)

  • CVE-2016-5391HigJun 13, 2017
    risk 0.49cvss 7.5epss 0.01

    libreswan before 3.18 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto daemon restart).

  • CVE-2016-5361HigJun 16, 2016
    risk 0.49cvss 7.5epss 0.01

    programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial-responder states, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed UDP packet. NOTE: the original behavior complies with the IKEv1 protocol, but has a required security update from the libreswan vendor; as of 2016-06-10, it is expected that several other IKEv1 implementations will have vendor-required security updates, with separate CVE IDs assigned to each.

  • CVE-2016-3071HigApr 18, 2016
    risk 0.49cvss 7.5epss 0.01

    Libreswan 3.16 might allow remote attackers to cause a denial of service (daemon restart) via an IKEv2 aes_xcbc transform.

  • CVE-2015-3240Nov 9, 2015
    risk 0.00cvss epss 0.01

    The pluto IKE daemon in libreswan before 3.15 and Openswan before 2.6.45, when built with NSS, allows remote attackers to cause a denial of service (assertion failure and daemon restart) via a zero DH g^x value in a KE payload in a IKE packet.

  • CVE-2015-3204Jul 1, 2015
    risk 0.00cvss epss 0.01

    libreswan 3.9 through 3.12 allows remote attackers to cause a denial of service (daemon restart) via an IKEv1 packet with (1) unassigned bits set in the IPSEC DOI value or (2) the next payload value set to ISAKMP_NEXT_SAK.

  • CVE-2013-6467Jan 26, 2014
    risk 0.00cvss epss 0.01

    Libreswan 3.7 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.

  • CVE-2013-7294Jan 16, 2014
    risk 0.00cvss epss 0.01

    The ikev2parent_inI1outR1 function in pluto/ikev2_parent.c in libreswan before 3.7 allows remote attackers to cause a denial of service (restart) via an IKEv2 I1 notification without a KE payload.

  • CVE-2013-7283Jan 9, 2014
    risk 0.00cvss epss 0.00

    Race condition in the libreswan.spec files for Red Hat Enterprise Linux (RHEL) and Fedora packages in libreswan 3.6 has unspecified impact and attack vectors, involving the /var/tmp/libreswan-nss-pwd temporary file.

  • CVE-2013-4564Jan 7, 2014
    risk 0.00cvss epss 0.01

    Libreswan 3.6 allows remote attackers to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet.

  • CVE-2013-2052Jul 9, 2013
    risk 0.00cvss epss 0.01

    Buffer overflow in the atodn function in libreswan 3.0 and 3.1, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.