Xelerance

Openswan

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.23%
  • Veröffentlicht 12.06.2019 14:29:02
  • Zuletzt bearbeitet 21.11.2024 04:18:32

The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check v...

  • EPSS 0.15%
  • Veröffentlicht 26.09.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:32

In verify_signed_hash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures whe...

  • EPSS 0.73%
  • Veröffentlicht 26.11.2014 15:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.

  • EPSS 1.01%
  • Veröffentlicht 26.01.2014 20:55:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.

  • EPSS 1.65%
  • Veröffentlicht 09.07.2013 17:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code ...

  • EPSS 0.54%
  • Veröffentlicht 17.11.2011 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Openswan 2.6.29 through 2.6.35 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto IKE daemon crash) via an ISAKMP message with an invalid KEY_LENGTH attribute, which is not properly handled by the error handling ...

  • EPSS 1.15%
  • Veröffentlicht 17.11.2011 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continu...

  • EPSS 0.65%
  • Veröffentlicht 05.10.2010 22:00:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-...

  • EPSS 6.11%
  • Veröffentlicht 05.10.2010 22:00:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a ...

  • EPSS 4.74%
  • Veröffentlicht 05.10.2010 22:00:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field.