Bug 2215952 (CVE-2023-38711) - CVE-2023-38711 libreswan: Invalid IKEv1 Quick Mode ID causes restart
Summary: CVE-2023-38711 libreswan: Invalid IKEv1 Quick Mode ID causes restart
Keywords:
Status: NEW
Alias: CVE-2023-38711
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2215955 2215956 2215957 2230238
Blocks: 2215953 2225370
TreeView+ depends on / blocked
 
Reported: 2023-06-19 13:16 UTC by TEJ RATHI
Modified: 2023-12-13 12:58 UTC (History)
2 users (show)

Fixed In Version: libreswan 4.12
Doc Type: If docs needed, set a value
Doc Text:
A NULL pointer dereference flaw was found in Libreswan when processing IKEv1 Quick Mode requests. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR receives an IDcr payload with ID_FQDN, it triggers a NULL pointer dereference error. This flaw allows a malicious client or attacker to send a malformed IKEv1 Quick Mode packet, causing a crash and restart of the libreswan pluto daemon. When sent continuously, this issue leads to a denial of service attack.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:6549 0 None None None 2023-11-07 08:19:18 UTC
Red Hat Product Errata RHSA-2023:7052 0 None None None 2023-11-14 15:19:23 UTC

Description TEJ RATHI 2023-06-19 13:16:32 UTC
When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR, receives an IDcr payload with ID_FQDN, a null pointer dereference causes a crash and restart of the pluto daemon.

https://libreswan.org/security/CVE-2023-38711/CVE-2023-38711.txt

Comment 5 TEJ RATHI 2023-07-25 06:15:33 UTC
Vulnerable versions : libreswan 4.6 - 4.11
Not vulnerable      : libreswan 3.0 - 4.5, 4.12+

Vulnerable code introduced in libreswan v4.6

Comment 7 TEJ RATHI 2023-08-09 05:39:21 UTC
Created libreswan tracking bugs for this issue:

Affects: fedora-all [bug 2230238]

Comment 8 errata-xmlrpc 2023-11-07 08:19:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6549 https://access.redhat.com/errata/RHSA-2023:6549

Comment 9 errata-xmlrpc 2023-11-14 15:19:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:7052 https://access.redhat.com/errata/RHSA-2023:7052


Note You need to log in before you can comment on or make changes to this bug.