This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Libreswan First view 2013-07-09
Product Libreswan Last view 2020-05-12
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:libreswan:libreswan:3.6:*:*:*:*:*:*:* 9
cpe:2.3:a:libreswan:libreswan:3.0:*:*:*:*:*:*:* 8
cpe:2.3:a:libreswan:libreswan:3.1:*:*:*:*:*:*:* 8
cpe:2.3:a:libreswan:libreswan:3.5:*:*:*:*:*:*:* 7
cpe:2.3:a:libreswan:libreswan:3.3:*:*:*:*:*:*:* 7
cpe:2.3:a:libreswan:libreswan:3.4:*:*:*:*:*:*:* 7
cpe:2.3:a:libreswan:libreswan:3.2:*:*:*:*:*:*:* 7
cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:* 7
cpe:2.3:a:libreswan:libreswan:3.10:*:*:*:*:*:*:* 6
cpe:2.3:a:libreswan:libreswan:3.11:*:*:*:*:*:*:* 6
cpe:2.3:a:libreswan:libreswan:3.12:*:*:*:*:*:*:* 6
cpe:2.3:a:libreswan:libreswan:3.9:*:*:*:*:*:*:* 6
cpe:2.3:a:libreswan:libreswan:3.14:*:*:*:*:*:*:* 6
cpe:2.3:a:libreswan:libreswan:3.16:*:*:*:*:*:*:* 6

Related : CVE

  Date Alert Description
7.5 2020-05-12 CVE-2020-1763

An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash.

3.1 2019-06-12 CVE-2019-10155

The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29.

7.5 2019-05-24 CVE-2019-12312

In Libreswan 3.27 an assertion failure can lead to a pluto IKE daemon restart. An attacker can trigger a NULL pointer dereference by initiating an IKEv2 IKE_SA_INIT exchange, followed by a bogus INFORMATIONAL exchange instead of the normallly expected IKE_AUTH exchange. This affects send_v2N_spi_response_from_state() in programs/pluto/ikev2_send.c that will then trigger a NULL pointer dereference leading to a restart of libreswan.

7.5 2017-06-13 CVE-2016-5391

libreswan before 3.18 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto daemon restart).

7.5 2016-06-16 CVE-2016-5361

programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial-responder states, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed UDP packet. NOTE: the original behavior complies with the IKEv1 protocol, but has a required security update from the libreswan vendor; as of 2016-06-10, it is expected that several other IKEv1 implementations will have vendor-required security updates, with separate CVE IDs assigned to each.

7.5 2016-04-18 CVE-2016-3071

Libreswan 3.16 might allow remote attackers to cause a denial of service (daemon restart) via an IKEv2 aes_xcbc transform.

4.3 2015-11-09 CVE-2015-3240

The pluto IKE daemon in libreswan before 3.15 and Openswan before 2.6.45, when built with NSS, allows remote attackers to cause a denial of service (assertion failure and daemon restart) via a zero DH g^x value in a KE payload in a IKE packet.

5 2015-07-01 CVE-2015-3204

libreswan 3.9 through 3.12 allows remote attackers to cause a denial of service (daemon restart) via an IKEv1 packet with (1) unassigned bits set in the IPSEC DOI value or (2) the next payload value set to ISAKMP_NEXT_SAK.

5 2014-01-26 CVE-2013-6467

Libreswan 3.7 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.

5 2014-01-16 CVE-2013-7294

The ikev2parent_inI1outR1 function in pluto/ikev2_parent.c in libreswan before 3.7 allows remote attackers to cause a denial of service (restart) via an IKEv2 I1 notification without a KE payload.

9.3 2014-01-09 CVE-2013-7283

Race condition in the libreswan.spec files for Red Hat Enterprise Linux (RHEL) and Fedora packages in libreswan 3.6 has unspecified impact and attack vectors, involving the /var/tmp/libreswan-nss-pwd temporary file.

5 2014-01-07 CVE-2013-4564

Libreswan 3.6 allows remote attackers to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet.

5.1 2013-07-09 CVE-2013-2052

Buffer overflow in the atodn function in libreswan 3.0 and 3.1, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.

CWE : Common Weakness Enumeration

%idName
28% (4) CWE-20 Improper Input Validation
14% (2) CWE-476 NULL Pointer Dereference
14% (2) CWE-189 Numeric Errors
7% (1) CWE-617 Reachable Assertion
7% (1) CWE-362 Race Condition
7% (1) CWE-354 Improper Validation of Integrity Check Value
7% (1) CWE-310 Cryptographic Issues
7% (1) CWE-125 Out-of-bounds Read
7% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:25475 SUSE-SU-2014:0178-1 -- Security update for openswan

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2017-05-01 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2016-1078.nasl - Type: ACT_GATHER_INFO
2016-12-15 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20161103_libreswan_on_SL7_x.nasl - Type: ACT_GATHER_INFO
2016-11-28 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2016-2603.nasl - Type: ACT_GATHER_INFO
2016-11-11 Name: The remote Oracle Linux host is missing a security update.
File: oraclelinux_ELSA-2016-2603.nasl - Type: ACT_GATHER_INFO
2016-11-04 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2016-2603.nasl - Type: ACT_GATHER_INFO
2016-08-09 Name: The remote Fedora host is missing a security update.
File: fedora_2016-d46685629d.nasl - Type: ACT_GATHER_INFO
2016-08-03 Name: The remote Fedora host is missing a security update.
File: fedora_2016-26a03340e6.nasl - Type: ACT_GATHER_INFO
2016-04-22 Name: The remote Fedora host is missing a security update.
File: fedora_2016-db13edba7c.nasl - Type: ACT_GATHER_INFO
2016-04-14 Name: The remote Fedora host is missing a security update.
File: fedora_2016-680a5a8ead.nasl - Type: ACT_GATHER_INFO
2016-04-13 Name: The remote Fedora host is missing a security update.
File: fedora_2016-711a04c964.nasl - Type: ACT_GATHER_INFO
2016-03-14 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201603-13.nasl - Type: ACT_GATHER_INFO
2015-11-05 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20151104_libreswan_on_SL7_x.nasl - Type: ACT_GATHER_INFO
2015-11-05 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2015-1979.nasl - Type: ACT_GATHER_INFO
2015-11-04 Name: The remote Oracle Linux host is missing a security update.
File: oraclelinux_ELSA-2015-1979.nasl - Type: ACT_GATHER_INFO
2015-11-04 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2015-1979.nasl - Type: ACT_GATHER_INFO
2015-06-25 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20150623_libreswan_on_SL7_x.nasl - Type: ACT_GATHER_INFO
2015-06-24 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2015-1154.nasl - Type: ACT_GATHER_INFO
2015-06-24 Name: The remote Oracle Linux host is missing a security update.
File: oraclelinux_ELSA-2015-1154.nasl - Type: ACT_GATHER_INFO
2015-06-24 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2015-1154.nasl - Type: ACT_GATHER_INFO
2015-06-15 Name: The remote Fedora host is missing a security update.
File: fedora_2015-9388.nasl - Type: ACT_GATHER_INFO
2015-06-11 Name: The remote Fedora host is missing a security update.
File: fedora_2015-9335.nasl - Type: ACT_GATHER_INFO
2015-06-11 Name: The remote Fedora host is missing a security update.
File: fedora_2015-9309.nasl - Type: ACT_GATHER_INFO
2014-02-01 Name: The remote SuSE 11 host is missing one or more security updates.
File: suse_11_openswan-140121.nasl - Type: ACT_GATHER_INFO
2014-01-29 Name: The remote Fedora host is missing a security update.
File: fedora_2014-1121.nasl - Type: ACT_GATHER_INFO
2014-01-29 Name: The remote Fedora host is missing a security update.
File: fedora_2014-1092.nasl - Type: ACT_GATHER_INFO