16 results (0.001 seconds)

CVSS: 3.5EPSS: 0%CPEs: 6EXPL: 0

The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29. Se ha encontrado una vulnerabilidad en el proyecto The Libreswan en el procesador de IKEv1 Los paquetes de intercambio informativo IKEv1 que están cifrados y protegidos por integridad utilizando las claves de integridad y cifrado IKE SA establecidas, pero como receptor, el valor de verificación de integridad no se verificó. Este problema afecta a las versiones anteriores a 3.29. A vulnerability was found in the Libreswan Project. • https://access.redhat.com/errata/RHSA-2019:3391 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155 https://libreswan.org/security/CVE-2019-10155 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUEXFCN7FAYBKJBQJLYCEUQUCHDEJRZW https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LFGPGLLKAXSLWFI62A6BZHTZSCHRCBXS https://access.redhat.com/security/cve/CVE-2019-10155 https://bugzilla.redhat.com/show_bug.cgi?id=1714141 • CWE-354: Improper Validation of Integrity Check Value •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

In verify_signed_hash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used. IKEv2 signature verification is affected when RAW RSA keys are used. En Openswan en versiones anteriores a la 2.6.50.1, la verificación de firmas IKEv2 es vulnerable a "variantes de ataques de bajo exponente de Bleichenbacher en firmas RSA PKCS#1" cuando se emplean claves RSA RAW. • https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51 https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d https://lists.openswan.org/pipermail/users/2018-August/023761.html • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466. Openswan 2.6.40 permite a atacantes remotos causar una denegación de servicio (referencia a puntero nulo y reinicio del demonio IKE) a través de paquetes IKEv2 que no llevan las cargas esperadas. NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE 2013-6466. • http://www.openwall.com/lists/oss-security/2014/02/18/1 http://www.openwall.com/lists/oss-security/2014/02/20/2 http://www.securityfocus.com/bid/65629 https://lists.openswan.org/pipermail/users/2014-February/022898.html • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 2%CPEs: 76EXPL: 0

Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. Openswan v2.6.39 y anteriores permite a atacantes remotos provocar una denegación de servicio (referencia a puntero nulo y reinicio del demonio IKE) a través de paquetes IKEv2 que cuenten con payloads esperados. • http://rhn.redhat.com/errata/RHSA-2014-0185.html http://www.debian.org/security/2014/dsa-2893 http://www.securityfocus.com/bid/65155 https://cert.vde.com/en-us/advisories/vde-2017-001 https://exchange.xforce.ibmcloud.com/vulnerabilities/90524 https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt https://access.redhat.com/security/cve/CVE-2013-6466 https://bugzilla.redhat.com/show_bug.cgi?id=1050277 •

CVSS: 7.6EPSS: 7%CPEs: 38EXPL: 0

Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054. Desbordamiento de buffer en la función atodn en Openswan anteriores a v2.6.39, cuando está activada Opportunistic Encryptiony se usa una clave RSA, permite a los atacantes remotos provocar una denegación de servicio (caída del demonio IKE)y posiblemente ejecutar código a través de registros DNS TXT. Nota: esta podría ser la misma vulnerabilidad que CVE-2013-2052 y CVE-2013-2054. • http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html http://rhn.redhat.com/errata/RHSA-2013-0827.html http://www.debian.org/security/2014/dsa-2893 http://www.securityfocus.com/bid/59838 https://bugzilla.redhat.com/show_bug.cgi?id=960229 https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html https://www.openswan.org/news/13 https://access.redhat.com/security/cve/CVE-2013-2053 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •