CVE-2024-3652
- EPSS 0.02%
- Veröffentlicht 11.04.2024 02:15:47
- Zuletzt bearbeitet 17.06.2025 20:54:44
The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. ...
CVE-2024-2357
- EPSS 0.4%
- Veröffentlicht 11.03.2024 20:15:07
- Zuletzt bearbeitet 21.11.2024 09:09:35
The Libreswan Project was notified of an issue causing libreswan to restart under some IKEv2 retransmit scenarios when a connection is configured to use PreSharedKeys (authby=secret) and the connection cannot find a matching configured secret. When s...
CVE-2023-38712
- EPSS 0.05%
- Veröffentlicht 25.08.2023 21:15:08
- Zuletzt bearbeitet 21.11.2024 08:14:06
An issue was discovered in Libreswan 3.x and 4.x before 4.12. When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a...
CVE-2023-38711
- EPSS 0.06%
- Veröffentlicht 25.08.2023 21:15:08
- Zuletzt bearbeitet 21.11.2024 08:14:06
An issue was discovered in Libreswan before 4.12. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR receives an IDcr payload with ID_FQDN, a NULL pointer dereference causes a crash and restart of the pluto daemon. NOTE:...
CVE-2023-38710
- EPSS 0.06%
- Veröffentlicht 25.08.2023 21:15:08
- Zuletzt bearbeitet 21.11.2024 08:14:06
An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packe...
CVE-2023-30570
- EPSS 0.18%
- Veröffentlicht 29.05.2023 00:15:09
- Zuletzt bearbeitet 14.01.2025 19:15:29
pluto in Libreswan before 4.11 allows a denial of service (responder SPI mishandling and daemon crash) via unauthenticated IKEv1 Aggressive Mode packets. The earliest affected version is 3.28.
CVE-2023-2295
- EPSS 1.67%
- Veröffentlicht 17.05.2023 23:15:09
- Zuletzt bearbeitet 22.01.2025 19:15:08
A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent...
CVE-2023-23009
- EPSS 0.3%
- Veröffentlicht 21.02.2023 16:15:11
- Zuletzt bearbeitet 17.03.2025 17:15:15
Libreswan 4.9 allows remote attackers to cause a denial of service (assert failure and daemon restart) via crafted TS payload with an incorrect selector length.
CVE-2022-23094
- EPSS 1.3%
- Veröffentlicht 15.01.2022 02:15:06
- Zuletzt bearbeitet 21.11.2024 06:47:58
Libreswan 4.2 through 4.5 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted IKEv1 packet because pluto/ikev1.c wrongly expects that a state object exists. This is fixed in 4.6.
CVE-2020-1763
- EPSS 4.76%
- Veröffentlicht 12.05.2020 14:15:12
- Zuletzt bearbeitet 21.11.2024 05:11:20
An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The...