Page 3 of 17 results (0.008 seconds)

CVSS: 5.0EPSS: 4%CPEs: 1EXPL: 0

The pluto IKE daemon in libreswan before 3.15 and Openswan before 2.6.45, when built with NSS, allows remote attackers to cause a denial of service (assertion failure and daemon restart) via a zero DH g^x value in a KE payload in a IKE packet. El demonio pluto IKE en libreswan en versiones anteriores a 3.15 y Openswan en versiones anteriores a 2.6.45, cuando ha sido construido con NSS, permite a atacantes remotos causar una denegación de servicio (fallo de aserción y reinicio de demonio) a través de un valor zero DH g^x en un payload KE en un paquete IKE. A flaw was discovered in the way Libreswan's IKE daemon processed IKE KE payloads. A remote attacker could send specially crafted IKE payload with a KE payload of g^x=0 that, when processed, would lead to a denial of service (daemon crash). • http://rhn.redhat.com/errata/RHSA-2015-1979.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securityfocus.com/bid/77536 http://www.securitytracker.com/id/1033418 https://libreswan.org/security/CVE-2015-3240/CVE-2015-3240.txt https://lists.openswan.org/pipermail/users/2015-August/023401.html https://security.gentoo.org/glsa/201603-13 https://access.redhat.com/security/cve/CVE-2015-3240 https://bugzilla.redhat.com/show_bug.cgi?id= • CWE-189: Numeric Errors CWE-617: Reachable Assertion •

CVSS: 5.0EPSS: 1%CPEs: 4EXPL: 0

libreswan 3.9 through 3.12 allows remote attackers to cause a denial of service (daemon restart) via an IKEv1 packet with (1) unassigned bits set in the IPSEC DOI value or (2) the next payload value set to ISAKMP_NEXT_SAK. libreswan 3.9 hasta 3.12 permite a atacantes remotos causar una denegación de servicio (reinicio de demonio) a través de un paquete IKEv1 con (1) bits no asignados configurados en el valor IPSEC DOI o (2) el valor del próxima carga útil configurado en ISAKMP_NEXT_SAK. A flaw was discovered in the way Libreswan's IKE daemon processed certain IKEv1 payloads. A remote attacker could send specially crafted IKEv1 payloads that, when processed, would lead to a denial of service (daemon crash). • http://rhn.redhat.com/errata/RHSA-2015-1154.html http://www.securityfocus.com/bid/75392 https://libreswan.org/security/CVE-2015-3204/CVE-2015-3204.txt https://security.gentoo.org/glsa/201603-13 https://access.redhat.com/security/cve/CVE-2015-3204 https://bugzilla.redhat.com/show_bug.cgi?id=1223361 • CWE-20: Improper Input Validation CWE-617: Reachable Assertion •

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 0

Libreswan 3.7 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. Libreswan v3.7 y anteriores permite a atacantes remotos provocar una denegación de servicio (referencia a puntero nulo y reinicio del demonio IKE) a través de paquetes IKEv2 que cuenten con payloads esperados. • http://osvdb.org/102172 http://secunia.com/advisories/56420 http://www.securityfocus.com/bid/64987 https://exchange.xforce.ibmcloud.com/vulnerabilities/90522 https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt •

CVSS: 5.0EPSS: 1%CPEs: 7EXPL: 1

The ikev2parent_inI1outR1 function in pluto/ikev2_parent.c in libreswan before 3.7 allows remote attackers to cause a denial of service (restart) via an IKEv2 I1 notification without a KE payload. La función ikev2parent_inI1outR1 en pluto/ikev2_parent.c de libreswan antes de 3.7 permite a atacantes remotos provocar una denegación de servicio (reinicio) a través de una notificación por IKEv2 I1 sin datos KE. • http://secunia.com/advisories/56276 http://secunia.com/advisories/56915 http://www.osvdb.org/101573 https://github.com/libreswan/libreswan/commit/2899351224fe2940aec37d7656e1e392c0fe07f0 https://lists.libreswan.org/pipermail/swan-announce/2013/000007.html • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 1

Race condition in the libreswan.spec files for Red Hat Enterprise Linux (RHEL) and Fedora packages in libreswan 3.6 has unspecified impact and attack vectors, involving the /var/tmp/libreswan-nss-pwd temporary file. Condición de carrera en archivos libreswan.spec para paquetes de Red Hat Enterprise Linux (RHEL) y Fedora en libreswan 3.6 tiene un impacto y vectores de ataque no especificados, involucrando el archivo temporal /var/tmp/libreswan-nss-pwd. • http://secunia.com/advisories/56276 http://www.osvdb.org/101575 https://github.com/libreswan/libreswan/commit/ef2d756e73a188401c36133c2e2f7ce4f3c6ae55 https://lists.libreswan.org/pipermail/swan-announce/2013/000007.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •