Debian Libreswan vulnerabilities

21 known vulnerabilities affecting debian/libreswan.

Total CVEs
21
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH4MEDIUM6LOW11

Vulnerabilities

Page 1 of 2
CVE-2024-3652MEDIUMCVSS 6.5fixed in libreswan 4.15-1 (forky)2024
CVE-2024-3652 [MEDIUM] CVE-2024-3652: libreswan - The Libreswan Project was notified of an issue causing libreswan to restart when... The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not affected. Scope: local bookworm: open bullseye: open forky: resolved (fixed in 4.15-1) sid
debian
CVE-2024-2357MEDIUMCVSS 6.5fixed in libreswan 4.14-1 (forky)2024
CVE-2024-2357 [MEDIUM] CVE-2024-2357: libreswan - The Libreswan Project was notified of an issue causing libreswan to restart unde... The Libreswan Project was notified of an issue causing libreswan to restart under some IKEv2 retransmit scenarios when a connection is configured to use PreSharedKeys (authby=secret) and the connection cannot find a matching configured secret. When such a connection is automatically added on startup using the auto= keyword, it can cause repeated crashes leading to
debian
CVE-2023-30570HIGHCVSS 7.5fixed in libreswan 4.10-2+deb12u1 (bookworm)2023
CVE-2023-30570 [HIGH] CVE-2023-30570: libreswan - pluto in Libreswan before 4.11 allows a denial of service (responder SPI mishand... pluto in Libreswan before 4.11 allows a denial of service (responder SPI mishandling and daemon crash) via unauthenticated IKEv1 Aggressive Mode packets. The earliest affected version is 3.28. Scope: local bookworm: resolved (fixed in 4.10-2+deb12u1) bullseye: resolved (fixed in 4.3-1+deb11u4) forky: resolved (fixed in 4.11-1) sid: resolved (fixed in 4.11-1) trixi
debian
CVE-2023-38711MEDIUMCVSS 6.5fixed in libreswan 4.12-1 (forky)2023
CVE-2023-38711 [MEDIUM] CVE-2023-38711: libreswan - An issue was discovered in Libreswan before 4.12. When an IKEv1 Quick Mode conne... An issue was discovered in Libreswan before 4.12. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR receives an IDcr payload with ID_FQDN, a NULL pointer dereference causes a crash and restart of the pluto daemon. NOTE: the earliest affected version is 4.6. Scope: local bookworm: open bullseye: resolved forky: resolved (fixed in 4.
debian
CVE-2023-23009MEDIUMCVSS 6.5fixed in libreswan 4.9-2 (bookworm)2023
CVE-2023-23009 [MEDIUM] CVE-2023-23009: libreswan - Libreswan 4.9 allows remote attackers to cause a denial of service (assert failu... Libreswan 4.9 allows remote attackers to cause a denial of service (assert failure and daemon restart) via crafted TS payload with an incorrect selector length. Scope: local bookworm: resolved (fixed in 4.9-2) bullseye: resolved (fixed in 4.3-1+deb11u3) forky: resolved (fixed in 4.9-2) sid: resolved (fixed in 4.9-2) trixie: resolved (fixed in 4.9-2)
debian
CVE-2023-38710MEDIUMCVSS 6.5fixed in libreswan 4.12-1 (forky)2023
CVE-2023-38710 [MEDIUM] CVE-2023-38710: libreswan - An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY p... An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) an
debian
CVE-2023-38712MEDIUMCVSS 6.5fixed in libreswan 4.12-1 (forky)2023
CVE-2023-38712 [MEDIUM] CVE-2023-38712: libreswan - An issue was discovered in Libreswan 3.x and 4.x before 4.12. When an IKEv1 ISAK... An issue was discovered in Libreswan 3.x and 4.x before 4.12. When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a NULL pointer dereference on the deleted state causes the pluto daemon to crash and restart. Scope: local bookworm
debian
CVE-2022-23094HIGHCVSS 7.5fixed in libreswan 4.6-1 (bookworm)2022
CVE-2022-23094 [HIGH] CVE-2022-23094: libreswan - Libreswan 4.2 through 4.5 allows remote attackers to cause a denial of service (... Libreswan 4.2 through 4.5 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted IKEv1 packet because pluto/ikev1.c wrongly expects that a state object exists. This is fixed in 4.6. Scope: local bookworm: resolved (fixed in 4.6-1) bullseye: resolved (fixed in 4.3-1+deb11u1) forky: resolved (fixed in 4.6-1) si
debian
CVE-2020-1763HIGHCVSS 7.5fixed in libreswan 3.32-1 (bookworm)2020
CVE-2020-1763 [HIGH] CVE-2020-1763: libreswan - An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan fro... An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash. Scope: local bookworm: resolved (fixed in 3.32-1) bullseye: resolved (fixed in 3.32-
debian
CVE-2019-12312HIGHCVSS 7.5fixed in libreswan 3.27-5 (bookworm)2019
CVE-2019-12312 [HIGH] CVE-2019-12312: libreswan - In Libreswan 3.27 an assertion failure can lead to a pluto IKE daemon restart. A... In Libreswan 3.27 an assertion failure can lead to a pluto IKE daemon restart. An attacker can trigger a NULL pointer dereference by initiating an IKEv2 IKE_SA_INIT exchange, followed by a bogus INFORMATIONAL exchange instead of the normallly expected IKE_AUTH exchange. This affects send_v2N_spi_response_from_state() in programs/pluto/ikev2_send.c that will then t
debian
CVE-2019-10155LOWCVSS 3.1fixed in libreswan 3.27-6 (bookworm)2019
CVE-2019-10155 [LOW] CVE-2019-10155: libreswan - The Libreswan Project has found a vulnerability in the processing of IKEv1 infor... The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29. Scope: local bookworm: resolved (fixed in 3.27-6) bul
debian
CVE-2018-5389LOWCVSS 5.92018
CVE-2018-5389 [MEDIUM] CVE-2018-5389: libreswan - The Internet Key Exchange v1 main mode is vulnerable to offline dictionary or br... The Internet Key Exchange v1 main mode is vulnerable to offline dictionary or brute force attacks. Reusing a key pair across different versions and modes of IKE could lead to cross-protocol authentication bypasses. It is well known, that the aggressive mode of IKEv1 PSK is vulnerable to offline dictionary or brute force attacks. For the main mode, however, only an
debian
CVE-2016-3071LOWCVSS 7.52016
CVE-2016-3071 [HIGH] CVE-2016-3071: libreswan - Libreswan 3.16 might allow remote attackers to cause a denial of service (daemon... Libreswan 3.16 might allow remote attackers to cause a denial of service (daemon restart) via an IKEv2 aes_xcbc transform. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2016-5361LOWCVSS 7.52016
CVE-2016-5361 [HIGH] CVE-2016-5361: libreswan - programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial-responder... programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial-responder states, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed UDP packet. NOTE: the original behavior complies with the IKEv1 protocol, but has a required security update from the libreswan vendor; as of 2016-06-10, it is expected that several
debian
CVE-2016-5391LOWCVSS 7.52016
CVE-2016-5391 [HIGH] CVE-2016-5391: libreswan - libreswan before 3.18 allows remote attackers to cause a denial of service (NULL... libreswan before 3.18 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto daemon restart). Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2015-3204LOWCVSS 5.02015
CVE-2015-3204 [MEDIUM] CVE-2015-3204: libreswan - libreswan 3.9 through 3.12 allows remote attackers to cause a denial of service ... libreswan 3.9 through 3.12 allows remote attackers to cause a denial of service (daemon restart) via an IKEv1 packet with (1) unassigned bits set in the IPSEC DOI value or (2) the next payload value set to ISAKMP_NEXT_SAK. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2015-3240LOWCVSS 4.32015
CVE-2015-3240 [MEDIUM] CVE-2015-3240: libreswan - The pluto IKE daemon in libreswan before 3.15 and Openswan before 2.6.45, when b... The pluto IKE daemon in libreswan before 3.15 and Openswan before 2.6.45, when built with NSS, allows remote attackers to cause a denial of service (assertion failure and daemon restart) via a zero DH g^x value in a KE payload in a IKE packet. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2013-6467LOWCVSS 5.02013
CVE-2013-6467 [MEDIUM] CVE-2013-6467: libreswan - Libreswan 3.7 and earlier allows remote attackers to cause a denial of service (... Libreswan 3.7 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2013-4564LOWCVSS 5.02013
CVE-2013-4564 [MEDIUM] CVE-2013-4564: libreswan - Libreswan 3.6 allows remote attackers to cause a denial of service (crash) via a... Libreswan 3.6 allows remote attackers to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2013-7283LOWCVSS 9.32013
CVE-2013-7283 [CRITICAL] CVE-2013-7283: libreswan - Race condition in the libreswan.spec files for Red Hat Enterprise Linux (RHEL) a... Race condition in the libreswan.spec files for Red Hat Enterprise Linux (RHEL) and Fedora packages in libreswan 3.6 has unspecified impact and attack vectors, involving the /var/tmp/libreswan-nss-pwd temporary file. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian