Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
libreswan libreswan vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-7283
Race condition in the libreswan.spec files for Red Hat Enterprise Linux (RHEL) and Fedora packages in libreswan 3.6 has unspecified impact and attack vectors, involving the /var/tmp/libreswan-nss-pwd temporary file.
Libreswan Libreswan 3.6
NA
CVE-2013-4564
Libreswan 3.6 allows remote malicious users to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet.
Libreswan Libreswan 3.6
6.5
CVSSv3
CVE-2023-23009
Libreswan 4.9 allows remote malicious users to cause a denial of service (assert failure and daemon restart) via crafted TS payload with an incorrect selector length.
Libreswan Libreswan 4.9
Debian Debian Linux 11.0
1 Github repository
7.5
CVSSv3
CVE-2016-5391
libreswan prior to 3.18 allows remote malicious users to cause a denial of service (NULL pointer dereference and pluto daemon restart).
Libreswan Libreswan
Fedoraproject Fedora 24
Fedoraproject Fedora 23
7.5
CVSSv3
CVE-2016-3071
Libreswan 3.16 might allow remote malicious users to cause a denial of service (daemon restart) via an IKEv2 aes_xcbc transform.
Libreswan Libreswan 3.16
Fedoraproject Fedora 23
Fedoraproject Fedora 24
7.5
CVSSv3
CVE-2022-23094
Libreswan 4.2 up to and including 4.5 allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted IKEv1 packet because pluto/ikev1.c wrongly expects that a state object exists. This is fixed in 4.6.
Libreswan Libreswan
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Debian Debian Linux 10.0
3.1
CVSSv3
CVE-2019-10155
The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This is...
Strongswan Strongswan
Libreswan Libreswan
Xelerance Openswan
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Redhat Enterprise Linux 8.0
7.5
CVSSv3
CVE-2023-2295
A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the ...
Libreswan Libreswan 4.9-1.el8
Libreswan Libreswan 4.9-1.el9
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
Redhat Enterprise Linux Server Tus 8.8
Redhat Enterprise Linux Server Aus 8.8
Redhat Enterprise Linux Eus 8.8
Redhat Enterprise Linux Server Aus 9.2
Redhat Enterprise Linux Eus 9.2
NA
CVE-2024-2357
The Libreswan Project was notified of an issue causing libreswan to restart under some IKEv2 retransmit scenarios when a connection is configured to use PreSharedKeys (authby=secret) and the connection cannot find a matching configured secret. When such a connection is automatica...
NA
CVE-2024-3652
The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not...
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2