{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2020-1763","title":"Title"},{"category":"description","text":"An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2020-1763","url":"https://www.suse.com/security/cve/CVE-2020-1763"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"}],"title":"SUSE CVE CVE-2020-1763","tracking":{"current_release_date":"2025-03-15T10:19:48Z","generator":{"date":"2023-10-31T02:31:52Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2020-1763","initial_release_date":"2023-10-31T02:31:52Z","revision_history":[{"date":"2023-10-31T02:31:52Z","number":"2","summary":"Current version"},{"date":"2025-01-01T06:01:53Z","number":"3","summary":"Current version"},{"date":"2025-02-15T06:39:19Z","number":"4","summary":"Current version"},{"date":"2025-02-17T07:03:29Z","number":"5","summary":"Current version"},{"date":"2025-03-15T10:19:48Z","number":"6","summary":"Current version"}],"status":"interim","version":"6"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Liberty Linux 8","product":{"name":"SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8","product_identification_helper":{"cpe":"cpe:/o:suse:sll:8"}}},{"category":"product_version","name":"libreswan-3.29-7.el8_2","product":{"name":"libreswan-3.29-7.el8_2","product_id":"libreswan-3.29-7.el8_2","product_identification_helper":{"purl":"pkg:rpm/suse/libreswan@3.29-7.el8_2"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"libreswan-3.29-7.el8_2 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:libreswan-3.29-7.el8_2"},"product_reference":"libreswan-3.29-7.el8_2","relates_to_product_reference":"SUSE Liberty Linux 8"}]},"vulnerabilities":[{"cve":"CVE-2020-1763","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-1763"}],"notes":[{"category":"general","text":"An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash.","title":"CVE description"}],"product_status":{"recommended":["SUSE Liberty Linux 8:libreswan-3.29-7.el8_2"]},"references":[{"category":"external","summary":"CVE-2020-1763","url":"https://www.suse.com/security/cve/CVE-2020-1763"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Liberty Linux 8:libreswan-3.29-7.el8_2"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Liberty Linux 8:libreswan-3.29-7.el8_2"]}],"threats":[{"category":"impact","date":"2020-05-12T03:55:25Z","details":"important"}],"title":"CVE-2020-1763"}]}