SB2014010704 - Multiple vulnerabilities in libreswan



SB2014010704 - Multiple vulnerabilities in libreswan

Published: January 7, 2014 Updated: October 15, 2020

Security Bulletin ID SB2014010704
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Medium 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2013-6467)

The vulnerability allows remote attackers to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.


2) Race condition (CVE-ID: CVE-2013-7283)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Race condition in the libreswan.spec files for Red Hat Enterprise Linux (RHEL) and Fedora packages in libreswan 3.6 has unspecified impact and attack vectors, involving the /var/tmp/libreswan-nss-pwd temporary file.


3) Input validation error (CVE-ID: CVE-2013-4564)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Libreswan 3.6 allows remote attackers to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet.


Remediation

Install update from vendor's website.