programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial-responder states, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed UDP packet. NOTE: the original behavior complies with the IKEv1 protocol, but has a required security update from the libreswan vendor; as of 2016-06-10, it is expected that several other IKEv1 implementations will have vendor-required security updates, with separate CVE IDs assigned to each.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5361.json"
[
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://github.com/libreswan/libreswan/commit/152d6d95632d8b9477c170f1de99bcd86d7fb1d6",
"digest": {
"line_hashes": [
"86627652806821049497760891271003665430",
"24201487968202576802260686202049093523",
"142477410369922442914278731243663070207",
"195996895018841027013861365178908799237",
"199365784008076806722690670567754263660",
"52319542269660515301921632493320412069",
"304808937194196592359069955689753404872",
"118760132748077652429291308902925545452",
"211774493758382654980443649852360948765",
"231585294691260960408558666364681762806",
"3644685348924904675938374493361824857",
"339878537889588885421261336996675171510",
"98931066176891567730705546114123706351",
"284659102604748356818408872773795585832",
"263710493929765914036940580108869563612",
"143853084601102197712553163232762326593"
],
"threshold": 0.9
},
"id": "CVE-2016-5361-dd7ca340",
"deprecated": false,
"target": {
"file": "programs/pluto/ikev1.c"
}
}
]