445
VMScore

CVE-2020-1763

Published: 12/05/2020 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libreswan libreswan 3.5

libreswan libreswan

Vendor Advisories

Debian Bug report logs - #960458 libreswan: CVE-2020-1763 Package: src:libreswan; Maintainer for src:libreswan is Daniel Kahn Gillmor <dkg@fifthhorsemannet>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 12 May 2020 19:39:01 UTC Severity: important Tags: patch, security, upstream Found in version ...
Synopsis Important: libreswan security update Type/Severity Security Advisory: Important Topic An update for libreswan is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base sc ...
Synopsis Important: libreswan security update Type/Severity Security Advisory: Important Topic An update for libreswan is now available for Red Hat Enterprise Linux 80 Update Services for SAP SolutionsRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnera ...
Synopsis Important: libreswan security update Type/Severity Security Advisory: Important Topic An update for libreswan is now available for Red Hat Enterprise Linux 81 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Sco ...
Stephan Zeisberg discovered that the libreswan IPsec implementation could be forced into a crash/restart via a malformed IKEv1 Informational Exchange packet, resulting in denial of service For the stable distribution (buster), this problem has been fixed in version 327-6+deb10u1 We recommend that you upgrade your libreswan packages For the deta ...