Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-5361

Опубликовано: 14 мар. 2016
Источник: redhat
CVSS2: 5

Описание

programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial-responder states, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed UDP packet. NOTE: the original behavior complies with the IKEv1 protocol, but has a required security update from the libreswan vendor; as of 2016-06-10, it is expected that several other IKEv1 implementations will have vendor-required security updates, with separate CVE IDs assigned to each.

A traffic amplification flaw was found in the Internet Key Exchange version 1 (IKEv1) protocol. A remote attacker could use a libreswan server with IKEv1 enabled in a network traffic amplification denial of service attack against other hosts on the network by sending UDP packets with a spoofed source address to that server.

Отчет

This is a protocol flaw which affects IKEv1. All complaint implementations are therefore affected by this flaw. Red Hat Product Security team, does not consider IKEv2 to be affected. For more details please refer to https://bugzilla.redhat.com/show_bug.cgi?id=1308508#c2

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5ipsec-toolsWill not fix
Red Hat Enterprise Linux 5openswanWill not fix
Red Hat Enterprise Linux 6libreswanWill not fix
Red Hat Enterprise Linux 6openswanWill not fix
Red Hat Enterprise Linux 7libreswanFixedRHSA-2016:260303.11.2016

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1308508IKEv1 protocol is vulnerable to DoS amplification attack

5 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.5
nvd
около 9 лет назад

programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial-responder states, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed UDP packet. NOTE: the original behavior complies with the IKEv1 protocol, but has a required security update from the libreswan vendor; as of 2016-06-10, it is expected that several other IKEv1 implementations will have vendor-required security updates, with separate CVE IDs assigned to each.

CVSS3: 7.5
debian
около 9 лет назад

programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial ...

CVSS3: 7.5
github
больше 3 лет назад

programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial-responder states, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed UDP packet. NOTE: the original behavior complies with the IKEv1 protocol, but has a required security update from the libreswan vendor; as of 2016-06-10, it is expected that several other IKEv1 implementations will have vendor-required security updates, with separate CVE IDs assigned to each.

oracle-oval
почти 9 лет назад

ELSA-2016-2603: libreswan security and bug fix update (MODERATE)

5 Medium

CVSS2