Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1050245 - (CVE-2013-6467) CVE-2013-6467 libreswan: dereferencing missing IKEv2 payloads causes pluto daemon to restart
CVE-2013-6467 libreswan: dereferencing missing IKEv2 payloads causes pluto da...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20140115,repor...
: Security
Depends On: 1050345 1058387 1058388
Blocks: 1050315
  Show dependency treegraph
 
Reported: 2014-01-08 16:37 EST by Kurt Seifried
Modified: 2015-10-15 14:10 EDT (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-01-28 01:04:17 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Kurt Seifried 2014-01-08 16:37:49 EST
Paul Wouters of Red Hat reports:

The Libreswan Project was notified by Iustina Melinte of a vulnerability
regarding dereferencing of non-received IKEv2 payloads. This allows
a malicious non-authenticated remote user to cause the libreswan IKE
daemon to restart.

Vulnerable versions: libreswan up to version 3.7
Not vulnerable     : libreswan 3.8

If you cannot upgrade to 3.8, please see the above link for a patch for this issue.

All versions of openswan including 2.6.39 are also vulnerable to this bug, see CVE-2013-6466

Vulnerability information
--------------------------

Iustina Melinte used a custom IKE fuzzer to test libreswan. By withholding
or renumbering certain IKEv2 payloads, the pluto IKE daemon crashes while
trying to dereference a NULL pointer on the presumably received payload.

Configurations that only allow IKEv1 are not vulnerable.

Exploitation
-------------

This denial of service can be launched by anyone using a few mangled
IKEv2 packets. No authentication credentials are required. No remote code
execution is possible through this vulnerability. Libreswan automatically
restarts when it crashes. Please note that this will also cause existing 
connections to drop.

Workaround
-----------

When not requiring or using IKEv2, adding the keyword ikev2=never to
all connections enforced that only IKEv1 can be used. This prevents the
affected code from being called. The default value for ikev2= is "yes",
meaning that IKEv2 is allowed and the affected code can be triggered causing
a denial-of-service. 

Credits
--------

This vulnerability was found by Iustina Melinte. The Libreswan Project is
especially thankful for Iustina's assistance with the IKE fuzzer software.
Comment 3 Vincent Danen 2014-01-27 12:08:37 EST
External References:

https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt
Comment 4 Vincent Danen 2014-01-27 12:22:25 EST
Created libreswan tracking bugs for this issue:

Affects: fedora-all [bug 1058387]
Affects: epel-6 [bug 1058388]

Note You need to log in before you can comment on or make changes to this bug.