First published: Wed Jul 01 2015(Updated: )
libreswan 3.9 through 3.12 allows remote attackers to cause a denial of service (daemon restart) via an IKEv1 packet with (1) unassigned bits set in the IPSEC DOI value or (2) the next payload value set to ISAKMP_NEXT_SAK.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libreswan | =3.9 | |
Libreswan | =3.10 | |
Libreswan | =3.11 | |
Libreswan | =3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3204 has a high severity rating due to its potential to cause a denial of service by restarting the daemon.
To fix CVE-2015-3204, update Libreswan to a version later than 3.12.
Versions 3.9 to 3.12 of Libreswan are affected by CVE-2015-3204.
CVE-2015-3204 is associated with a denial of service attack that can be triggered by malformed IKEv1 packets.
There are no documented workarounds for CVE-2015-3204, so the best option is to upgrade to a secure version.