Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
libreswan libreswan vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2023-23009
Libreswan 4.9 allows remote malicious users to cause a denial of service (assert failure and daemon restart) via crafted TS payload with an incorrect selector length.
Libreswan Libreswan 4.9
Debian Debian Linux 11.0
1 Github repository
3.1
CVSSv3
CVE-2019-10155
The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This is...
Strongswan Strongswan
Libreswan Libreswan
Xelerance Openswan
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Redhat Enterprise Linux 8.0
NA
CVE-2024-3652
The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not...
NA
CVE-2024-2357
The Libreswan Project was notified of an issue causing libreswan to restart under some IKEv2 retransmit scenarios when a connection is configured to use PreSharedKeys (authby=secret) and the connection cannot find a matching configured secret. When such a connection is automatica...
NA
CVE-2015-3204
libreswan 3.9 up to and including 3.12 allows remote malicious users to cause a denial of service (daemon restart) via an IKEv1 packet with (1) unassigned bits set in the IPSEC DOI value or (2) the next payload value set to ISAKMP_NEXT_SAK.
Libreswan Libreswan 3.10
Libreswan Libreswan 3.12
Libreswan Libreswan 3.11
Libreswan Libreswan 3.9
NA
CVE-2013-6467
Libreswan 3.7 and previous versions allows remote malicious users to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.
Libreswan Libreswan 3.5
Libreswan Libreswan 3.6
Libreswan Libreswan 3.3
Libreswan Libreswan 3.4
Libreswan Libreswan 3.1
Libreswan Libreswan 3.2
Libreswan Libreswan 3.0
Libreswan Libreswan
NA
CVE-2013-7294
The ikev2parent_inI1outR1 function in pluto/ikev2_parent.c in libreswan prior to 3.7 allows remote malicious users to cause a denial of service (restart) via an IKEv2 I1 notification without a KE payload.
Libreswan Libreswan 3.0
Libreswan Libreswan 3.1
Libreswan Libreswan 3.2
Libreswan Libreswan 3.3
Libreswan Libreswan 3.4
Libreswan Libreswan 3.5
Libreswan Libreswan
NA
CVE-2013-7283
Race condition in the libreswan.spec files for Red Hat Enterprise Linux (RHEL) and Fedora packages in libreswan 3.6 has unspecified impact and attack vectors, involving the /var/tmp/libreswan-nss-pwd temporary file.
Libreswan Libreswan 3.6
NA
CVE-2013-4564
Libreswan 3.6 allows remote malicious users to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet.
Libreswan Libreswan 3.6
NA
CVE-2013-2052
Buffer overflow in the atodn function in libreswan 3.0 and 3.1, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote malicious users to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT recor...
Libreswan Libreswan 3.0
Libreswan Libreswan 3.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2