CVE-2020-1763

HIGH

libreswan <3.32 - Buffer Overflow

Title source: llm
STIX 2.1

Description

An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash.

References (8)

Core 8
Core References
Patch, Vendor Advisory x_refsource_confirm
https://libreswan.org/security/CVE-2020-1763/CVE-2020-1763.txt
Issue Tracking, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1763
Issue Tracking, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=1813329
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2020/dsa-4684
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202007-21
Third Party Advisory x_refsource_confirm
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
Third Party Advisory, US Government Resource x_refsource_misc
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04

Scores

CVSS v3 7.5
EPSS 0.0476
EPSS Percentile 89.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-125
Status published
Products (2)
libreswan/libreswan 3.5
libreswan/libreswan 3.27 - 3.31
Published May 12, 2020
Tracked Since Feb 18, 2026