Bug 2274448 (CVE-2024-3652) - CVE-2024-3652 libreswan: IKEv1 default AH/ESP responder can crash and restart
Summary: CVE-2024-3652 libreswan: IKEv1 default AH/ESP responder can crash and restart
Keywords:
Status: NEW
Alias: CVE-2024-3652
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2275403
Blocks: 2274452
TreeView+ depends on / blocked
 
Reported: 2024-04-11 05:54 UTC by TEJ RATHI
Modified: 2024-07-09 12:52 UTC (History)
2 users (show)

Fixed In Version: libreswan 4.15, libreswan 5.0
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Libreswan, where it was identified to contain an assertion failure issue in the compute_proto_keymat() function. The vulnerability can be exploited when an IKEv1 connection is loaded with an AH/ESP default setting when no esp= line is present in the connection. This flaw allows an authenticated attacker to send the bogus AES-GMAC proposal request, triggering the issue and causing Libreswan to crash and restart. When this connection is automatically added on startup using the auto= keyword, it can cause repeated crashes, leading to a denial of service. No remote code execution is possible.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:4050 0 None None None 2024-06-23 22:32:27 UTC
Red Hat Product Errata RHSA-2024:4200 0 None None None 2024-07-01 08:40:59 UTC
Red Hat Product Errata RHSA-2024:4376 0 None None None 2024-07-08 14:30:33 UTC
Red Hat Product Errata RHSA-2024:4377 0 None None None 2024-07-08 13:52:11 UTC
Red Hat Product Errata RHSA-2024:4417 0 None None None 2024-07-09 09:59:23 UTC
Red Hat Product Errata RHSA-2024:4431 0 None None None 2024-07-09 12:52:32 UTC

Description TEJ RATHI 2024-04-11 05:54:43 UTC
libreswan can crash and restart when it is acting as an IKEv1 responder with AH/ESP default setting, when no esp= line is present in the connection configuration. The bug is triggered when after IKEv1 authentication has succeeded (via Main Mode or Aggressive Mode), a Quick Mode message is received containing a bogus AES-GMAC proposal.

When such a connection is automatically added on startup using the auto=keyword, it can cause repeated crashes leading to a Denial of Service. No Remote Code Execution is possible. IKEv2 connections are not vulnerable.

Vulnerable versions : libreswan 3.22 - 4.14

https://libreswan.org/security/CVE-2024-3652
https://github.com/libreswan/libreswan/issues/1665

Comment 2 Sandipan Roy 2024-04-17 04:45:09 UTC
Created libreswan tracking bugs for this issue:

Affects: fedora-all [bug 2275403]

Comment 5 errata-xmlrpc 2024-06-23 22:32:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:4050 https://access.redhat.com/errata/RHSA-2024:4050

Comment 6 errata-xmlrpc 2024-07-01 08:40:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:4200 https://access.redhat.com/errata/RHSA-2024:4200

Comment 7 errata-xmlrpc 2024-07-08 13:52:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:4377 https://access.redhat.com/errata/RHSA-2024:4377

Comment 8 errata-xmlrpc 2024-07-08 14:30:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:4376 https://access.redhat.com/errata/RHSA-2024:4376

Comment 9 errata-xmlrpc 2024-07-09 09:59:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2024:4417 https://access.redhat.com/errata/RHSA-2024:4417

Comment 10 errata-xmlrpc 2024-07-09 12:52:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:4431 https://access.redhat.com/errata/RHSA-2024:4431


Note You need to log in before you can comment on or make changes to this bug.