CVE-2015-3204
libreswan: crafted IKE packet causes daemon restart
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
libreswan 3.9 through 3.12 allows remote attackers to cause a denial of service (daemon restart) via an IKEv1 packet with (1) unassigned bits set in the IPSEC DOI value or (2) the next payload value set to ISAKMP_NEXT_SAK.
libreswan 3.9 hasta 3.12 permite a atacantes remotos causar una denegación de servicio (reinicio de demonio) a través de un paquete IKEv1 con (1) bits no asignados configurados en el valor IPSEC DOI o (2) el valor del próxima carga útil configurado en ISAKMP_NEXT_SAK.
A flaw was discovered in the way Libreswan's IKE daemon processed certain IKEv1 payloads. A remote attacker could send specially crafted IKEv1 payloads that, when processed, would lead to a denial of service (daemon crash).
Libreswan is an implementation of IPsec & IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network. A flaw was discovered in the way Libreswan's IKE daemon processed certain IKEv1 payloads. A remote attacker could send specially crafted IKEv1 payloads that, when processed, would lead to a denial of service.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-04-10 CVE Reserved
- 2015-06-23 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-617: Reachable Assertion
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/75392 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2015-1154.html | 2023-02-13 | |
https://libreswan.org/security/CVE-2015-3204/CVE-2015-3204.txt | 2023-02-13 | |
https://security.gentoo.org/glsa/201603-13 | 2023-02-13 | |
https://access.redhat.com/security/cve/CVE-2015-3204 | 2015-06-23 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1223361 | 2015-06-23 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Libreswan Search vendor "Libreswan" | Libreswan Search vendor "Libreswan" for product "Libreswan" | 3.9 Search vendor "Libreswan" for product "Libreswan" and version "3.9" | - |
Affected
| ||||||
Libreswan Search vendor "Libreswan" | Libreswan Search vendor "Libreswan" for product "Libreswan" | 3.10 Search vendor "Libreswan" for product "Libreswan" and version "3.10" | - |
Affected
| ||||||
Libreswan Search vendor "Libreswan" | Libreswan Search vendor "Libreswan" for product "Libreswan" | 3.11 Search vendor "Libreswan" for product "Libreswan" and version "3.11" | - |
Affected
| ||||||
Libreswan Search vendor "Libreswan" | Libreswan Search vendor "Libreswan" for product "Libreswan" | 3.12 Search vendor "Libreswan" for product "Libreswan" and version "3.12" | - |
Affected
|