First published: Thu Jun 16 2016(Updated: )
programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial-responder states, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed UDP packet. NOTE: the original behavior complies with the IKEv1 protocol, but has a required security update from the libreswan vendor; as of 2016-06-10, it is expected that several other IKEv1 implementations will have vendor-required security updates, with separate CVE IDs assigned to each.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libreswan | <=3.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5361 has a severity rating that indicates a denial of service vulnerability due to traffic amplification risks.
To fix CVE-2016-5361, upgrade to Libreswan version 3.17 or later.
CVE-2016-5361 allows remote attackers to launch a denial of service attack through spoofed UDP packets.
Libreswan versions prior to 3.17, including 3.16 and earlier, are affected by CVE-2016-5361.
Yes, the original behavior of CVE-2016-5361 complies with the IKEv1 protocol but requires a security update.