Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
libreswan libreswan vulnerabilities and exploits
(subscribe to this query)
3.1
CVSSv3
CVE-2019-10155
The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This is...
Strongswan Strongswan
Libreswan Libreswan
Xelerance Openswan
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Redhat Enterprise Linux 8.0
7.5
CVSSv3
CVE-2019-12312
In Libreswan 3.27 an assertion failure can lead to a pluto IKE daemon restart. An attacker can trigger a NULL pointer dereference by initiating an IKEv2 IKE_SA_INIT exchange, followed by a bogus INFORMATIONAL exchange instead of the normallly expected IKE_AUTH exchange. This affe...
Libreswan Libreswan
7.5
CVSSv3
CVE-2016-5391
libreswan prior to 3.18 allows remote malicious users to cause a denial of service (NULL pointer dereference and pluto daemon restart).
Libreswan Libreswan
Fedoraproject Fedora 24
Fedoraproject Fedora 23
7.5
CVSSv3
CVE-2016-3071
Libreswan 3.16 might allow remote malicious users to cause a denial of service (daemon restart) via an IKEv2 aes_xcbc transform.
Libreswan Libreswan 3.16
Fedoraproject Fedora 23
Fedoraproject Fedora 24
NA
CVE-2015-3204
libreswan 3.9 up to and including 3.12 allows remote malicious users to cause a denial of service (daemon restart) via an IKEv1 packet with (1) unassigned bits set in the IPSEC DOI value or (2) the next payload value set to ISAKMP_NEXT_SAK.
Libreswan Libreswan 3.10
Libreswan Libreswan 3.12
Libreswan Libreswan 3.11
Libreswan Libreswan 3.9
NA
CVE-2013-6467
Libreswan 3.7 and previous versions allows remote malicious users to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.
Libreswan Libreswan 3.5
Libreswan Libreswan 3.6
Libreswan Libreswan 3.3
Libreswan Libreswan 3.4
Libreswan Libreswan 3.1
Libreswan Libreswan 3.2
Libreswan Libreswan 3.0
Libreswan Libreswan
NA
CVE-2013-7294
The ikev2parent_inI1outR1 function in pluto/ikev2_parent.c in libreswan prior to 3.7 allows remote malicious users to cause a denial of service (restart) via an IKEv2 I1 notification without a KE payload.
Libreswan Libreswan 3.0
Libreswan Libreswan 3.1
Libreswan Libreswan 3.2
Libreswan Libreswan 3.3
Libreswan Libreswan 3.4
Libreswan Libreswan 3.5
Libreswan Libreswan
NA
CVE-2013-7283
Race condition in the libreswan.spec files for Red Hat Enterprise Linux (RHEL) and Fedora packages in libreswan 3.6 has unspecified impact and attack vectors, involving the /var/tmp/libreswan-nss-pwd temporary file.
Libreswan Libreswan 3.6
NA
CVE-2013-4564
Libreswan 3.6 allows remote malicious users to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet.
Libreswan Libreswan 3.6
NA
CVE-2013-2052
Buffer overflow in the atodn function in libreswan 3.0 and 3.1, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote malicious users to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT recor...
Libreswan Libreswan 3.0
Libreswan Libreswan 3.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2