CVE-2019-10155
- EPSS 0.23%
- Veröffentlicht 12.06.2019 14:29:02
- Zuletzt bearbeitet 21.11.2024 04:18:32
The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check v...
CVE-2018-15836
- EPSS 0.15%
- Veröffentlicht 26.09.2018 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:51:32
In verify_signed_hash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures whe...
- EPSS 0.73%
- Veröffentlicht 26.11.2014 15:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.
- EPSS 1.01%
- Veröffentlicht 26.01.2014 20:55:05
- Zuletzt bearbeitet 11.04.2025 00:51:21
Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.
CVE-2013-2053
- EPSS 1.65%
- Veröffentlicht 09.07.2013 17:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code ...
- EPSS 0.54%
- Veröffentlicht 17.11.2011 19:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
Openswan 2.6.29 through 2.6.35 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto IKE daemon crash) via an ISAKMP message with an invalid KEY_LENGTH attribute, which is not properly handled by the error handling ...
- EPSS 1.15%
- Veröffentlicht 17.11.2011 19:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continu...
CVE-2010-3753
- EPSS 0.65%
- Veröffentlicht 05.10.2010 22:00:06
- Zuletzt bearbeitet 11.04.2025 00:51:21
programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-...
CVE-2010-3302
- EPSS 6.11%
- Veröffentlicht 05.10.2010 22:00:05
- Zuletzt bearbeitet 11.04.2025 00:51:21
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a ...
CVE-2010-3308
- EPSS 4.74%
- Veröffentlicht 05.10.2010 22:00:05
- Zuletzt bearbeitet 11.04.2025 00:51:21
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field.