CVE-2020-1763

Name
CVE-2020-1763
Description
An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1763
Patch https://github.com/libreswan/libreswan/commit/471a3e41a449d7c753bc4edbba4239501bb62ba8
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1813329
Patch https://libreswan.org/security/CVE-2020-1763/CVE-2020-1763.txt
Third Party Advisory https://www.debian.org/security/2020/dsa-4684
GENTOO https://security.gentoo.org/glsa/202007-21
CONFIRM https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
MISC https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:libreswan:libreswan:3.5:*:*:*:*:*:*:* libreswan == None == 3.5
cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:* libreswan >= 3.27 <= 3.31

Vulnerable and fixed packages

Source package Branch Version Maintainer Status