The Libreswan Project Libreswan vulnerabilities
4 known vulnerabilities affecting the_libreswan_project/libreswan.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM2LOW1
Vulnerabilities
Page 1 of 1
CVE-2024-3652MEDIUMCVSS 6.5≥ 3.22, ≤ 4.142024-04-11
CVE-2024-3652 [MEDIUM] CWE-404 CVE-2024-3652: The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without
The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not affected.
nvd
CVE-2024-2357MEDIUMCVSS 6.5≥ 4.2, ≤ 4.122024-03-11
CVE-2024-2357 [MEDIUM] CVE-2024-2357: The Libreswan Project was notified of an issue causing libreswan to restart under some IKEv2 retrans
The Libreswan Project was notified of an issue causing libreswan to restart under some IKEv2 retransmit scenarios when a connection is configured to use PreSharedKeys (authby=secret) and the connection cannot find a matching configured secret. When such a connection is automatically added on startup using the auto= keyword, it can cause repeated crashes leadi
nvd
CVE-2020-1763HIGHCVSS 7.5vfrom versions 3.27 till 3.312020-05-12
CVE-2020-1763 [HIGH] CWE-125 CVE-2020-1763: An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till
An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash.
nvd
CVE-2019-10155LOWCVSS 3.1v3.292019-06-12
CVE-2019-10155 [LOW] CWE-354 CVE-2019-10155: The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange pa
The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29.
nvd