SB2016031221 - Gentoo update for Libreswan



SB2016031221 - Gentoo update for Libreswan

Published: March 12, 2016 Updated: September 25, 2016

Security Bulletin ID SB2016031221
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2015-3204)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

libreswan 3.9 through 3.12 allows remote attackers to cause a denial of service (daemon restart) via an IKEv1 packet with (1) unassigned bits set in the IPSEC DOI value or (2) the next payload value set to ISAKMP_NEXT_SAK.


2) Input validation error (CVE-ID: CVE-2015-3240)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The pluto IKE daemon in libreswan before 3.15 and Openswan before 2.6.45, when built with NSS, allows remote attackers to cause a denial of service (assertion failure and daemon restart) via a zero DH g^x value in a KE payload in a IKE packet.


Remediation

Install update from vendor's website.