Page 2 of 8 results (0.005 seconds)

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 0

Libreswan 3.7 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. Libreswan v3.7 y anteriores permite a atacantes remotos provocar una denegación de servicio (referencia a puntero nulo y reinicio del demonio IKE) a través de paquetes IKEv2 que cuenten con payloads esperados. • http://osvdb.org/102172 http://secunia.com/advisories/56420 http://www.securityfocus.com/bid/64987 https://exchange.xforce.ibmcloud.com/vulnerabilities/90522 https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt •

CVSS: 5.0EPSS: 1%CPEs: 7EXPL: 1

The ikev2parent_inI1outR1 function in pluto/ikev2_parent.c in libreswan before 3.7 allows remote attackers to cause a denial of service (restart) via an IKEv2 I1 notification without a KE payload. La función ikev2parent_inI1outR1 en pluto/ikev2_parent.c de libreswan antes de 3.7 permite a atacantes remotos provocar una denegación de servicio (reinicio) a través de una notificación por IKEv2 I1 sin datos KE. • http://secunia.com/advisories/56276 http://secunia.com/advisories/56915 http://www.osvdb.org/101573 https://github.com/libreswan/libreswan/commit/2899351224fe2940aec37d7656e1e392c0fe07f0 https://lists.libreswan.org/pipermail/swan-announce/2013/000007.html • CWE-20: Improper Input Validation •

CVSS: 5.1EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in the atodn function in libreswan 3.0 and 3.1, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054. Desbordamiento de buffer en la función atodn en libreswan v3.0 y v3.1, cuando está activada Opportunistic Encryptiony se usa una clave RSA, permite a los atacantes remotos provocar una denegación de servicio (caída del demonio IKE)y posiblemente ejecutar código a través de registros DNS TXT. Nota: esta podría ser la misma vulnerabilidad que CVE-2013-2052 y CVE-2013-2054. • https://libreswan.org/security/CVE-2013-2052/CVE-2013-2052.txt https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •