Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
libreswan libreswan vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-3652
The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not...
NA
CVE-2024-2357
The Libreswan Project was notified of an issue causing libreswan to restart under some IKEv2 retransmit scenarios when a connection is configured to use PreSharedKeys (authby=secret) and the connection cannot find a matching configured secret. When such a connection is automatica...
6.5
CVSSv3
CVE-2023-38710
An issue exists in Libreswan prior to 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies o...
Libreswan Libreswan
6.5
CVSSv3
CVE-2023-38711
An issue exists in Libreswan prior to 4.12. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR receives an IDcr payload with ID_FQDN, a NULL pointer dereference causes a crash and restart of the pluto daemon. NOTE: the earliest affected version is 4....
Libreswan Libreswan
6.5
CVSSv3
CVE-2023-38712
An issue exists in Libreswan 3.x and 4.x prior to 4.12. When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a NULL pointer dereference on the del...
Libreswan Libreswan
7.5
CVSSv3
CVE-2023-30570
pluto in Libreswan prior to 4.11 allows a denial of service (responder SPI mishandling and daemon crash) via unauthenticated IKEv1 Aggressive Mode packets. The earliest affected version is 3.28.
Libreswan Libreswan
1 Github repository
7.5
CVSSv3
CVE-2023-2295
A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the ...
Libreswan Libreswan 4.9-1.el8
Libreswan Libreswan 4.9-1.el9
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
Redhat Enterprise Linux Server Tus 8.8
Redhat Enterprise Linux Server Aus 8.8
Redhat Enterprise Linux Eus 8.8
Redhat Enterprise Linux Server Aus 9.2
Redhat Enterprise Linux Eus 9.2
6.5
CVSSv3
CVE-2023-23009
Libreswan 4.9 allows remote malicious users to cause a denial of service (assert failure and daemon restart) via crafted TS payload with an incorrect selector length.
Libreswan Libreswan 4.9
Debian Debian Linux 11.0
1 Github repository
7.5
CVSSv3
CVE-2022-23094
Libreswan 4.2 up to and including 4.5 allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted IKEv1 packet because pluto/ikev1.c wrongly expects that a state object exists. This is fixed in 4.6.
Libreswan Libreswan
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Debian Debian Linux 10.0
7.5
CVSSv3
CVE-2020-1763
An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the cra...
Libreswan Libreswan 3.5
Libreswan Libreswan
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »