First published: Tue May 12 2020(Updated: )
An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libreswan | 3.27-6+deb10u1 4.3-1+deb11u4 4.3-1+deb11u3 4.10-2+deb12u1 4.12-1 | |
debian/libreswan | <=3.27-6<=3.29-2 | 3.27-6+deb10u1 3.32-1 |
Libreswan Libreswan | >=3.27<=3.31 | |
Libreswan Libreswan | =3.5 | |
Siemens RUGGEDCOM ROX MX5000 | <2.14.0 | 2.14.0 |
Siemens RUGGEDCOM ROX RX1400 | <2.14.0 | 2.14.0 |
Siemens RUGGEDCOM ROX RX1500 | <2.14.0 | 2.14.0 |
Siemens RUGGEDCOM ROX RX1501 | <2.14.0 | 2.14.0 |
Siemens RUGGEDCOM ROX RX1510 | <2.14.0 | 2.14.0 |
Siemens RUGGEDCOM ROX RX1511 | <2.14.0 | 2.14.0 |
Siemens RUGGEDCOM ROX RX500 | <2.14.0 | 2.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1763 is an out-of-bounds buffer read flaw in the pluto daemon of libreswan.
CVE-2020-1763 allows an unauthenticated attacker to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets.
Versions 3.27 to 3.31 of libreswan are affected by CVE-2020-1763.
CVE-2020-1763 has a severity value of 7.5, which is considered high.
To fix CVE-2020-1763, you should update to the patched versions of libreswan (3.27-6+deb10u1, 4.3-1+deb11u4, 4.3-1+deb11u3, 4.10-2+deb12u1, 4.12-1, or 3.32-1).