Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 10 Jun 2016 08:34:34 -0400 (EDT)
From: cve-assign@...re.org
To: huzaifas@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: IKEv1 protocol is vulnerable to DoS amplification attack

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> I would like to request a CVE for the protocol flaw in IKEv1, details below:

> https://www.kb.cert.org/vuls/id/419128
> https://blogs.akamai.com/2016/02/ikeikev2-ripe-for-ddos-abuse.html

> https://bugzilla.redhat.com/show_bug.cgi?id=1308508
> https://github.com/libreswan/libreswan/commit/152d6d95632d8b9477c170f1de99bcd86d7fb1d6
> https://lists.libreswan.org/pipermail/swan-dev/2016-March/001394.html

> Can a CVE id be please assigned to this?

CVE IDs are not assigned to UDP protocols solely on the basis of an
observed amplification-attack risk. A CVE ID can exist if the UDP
reply traffic simply cannot ever have any legitimate purpose for users
of a protocol. The general case of the interaction between UDP
amplification and CVE was discussed between MITRE and CERT in 2013;
this may be the reason that no CVE ID is listed in the
https://www.kb.cert.org/vuls/id/419128 document.

We can, however, assign a CVE ID to a vendor's announcement of a
required security update, such as on the https://libreswan.org/ home
page:

  "libreswan 3.16 vulnerable to DDOS attack. Please upgrade to 3.17"

Use CVE-2016-5361 for this issue only in the libreswan codebase.


> https://bugzilla.redhat.com/show_bug.cgi?id=1308508#c6

> This is tracked via upstream bug:

> https://bugs.libreswan.org/show_bug.cgi?id=262

We don't think that Bug 262 tracks this "one update to libreswan IKEv1
to reduce amplification caused by retransmits" issue. Bug 262 is about
a possible functionality problem in the 3.17 release, It is marked
"Importance: Low enhancement."

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJXWrL9AAoJEHb/MwWLVhi2DokP/05yJL+xl3qdCOdoJ3Y+QqhR
2B2ktnsgySAPkPSaBQCQd2PcRTedM+yRzXTqOiBsiPm1PrB85YOemhLn37H4bwM2
C17TMsrwXa2tnPQAxjqZNP6j6fg2Y0Cw2/odUsXdV0ZR9VxtePQUI0GBKq5RBmJn
BtCfHlQFf145H9MO8tUJ3LNxu076JmfAy33q25Ha7/bU46H6HiiybSB4UOUziiDL
0OEAbCMKVDEorTW0Cu9OcdhVFi3u13WO3GUmTIGaXVboMnq0N1Swdlg7V18XSikZ
P61tdEBVA9565cEKR+OnAG4nC5uFZ8Sri0FJCPS21nbQ8J0srOtlBBZt55+W5SzX
0JPLSc6maxtDH8XVYLHHlLyMYCFkUmMztifnEzV2WAulrzW5fZZyo6hkSo1dMQ3S
uLfm8bvfwopIYRGCeTPesDIQIPoqSy9lfh01Z9GJ2G59Jg8SZIPIzH09h7ft4OYv
cK79yb5v/XdyNH3PUHTEmEm4wkQeJY/X2TFob5iGCxOSmKUs+rWMMliVIJd22K25
2e0Y2nOv1Z4PTS2+c2uncswFPP1IQmSN9/jP8sIKXeg+NjthgzUJ7V69iMyFkkLZ
dZVGvK3VGm5qM1Zmh7AG7iIjj0IRIHEIh7TJD/LmFqCDC6Qkjm4gVXbXiAZjsr2R
8pFYiRXpWVYsrwtR+nBs
=L6xn
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.