Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-3652

Опубликовано: 15 апр. 2024
Источник: redhat
CVSS3: 6.5

Описание

The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not affected.

A flaw was found in Libreswan, where it was identified to contain an assertion failure issue in the compute_proto_keymat() function. The vulnerability can be exploited when an IKEv1 connection is loaded with an AH/ESP default setting when no esp= line is present in the connection. This flaw allows an authenticated attacker to send the bogus AES-GMAC proposal request, triggering the issue and causing Libreswan to crash and restart. When this connection is automatically added on startup using the auto= keyword, it can cause repeated crashes, leading to a denial of service. No remote code execution is possible.

Отчет

The CVE-2024-3652 vulnerability in Libreswan is classified as a moderate severity issue due to its limited scope and impact. While the vulnerability can lead to Denial of Service (DoS) by causing the Libreswan service to crash and restart, it does not allow for Remote Code Execution or expose sensitive data. Additionally, the exploitation of this vulnerability requires specific conditions to be met: an IKEv1 connection loaded without an esp= line and the peer to have authenticated itself. Furthermore, IKEv2 connections are not vulnerable to this issue.

Меры по смягчению последствий

An esp= line using a common IKEv1 algorithm list can be added to all IKEv1 based connections. An example of such an esp= line could be:

esp=aes-sha2_512,aes-sha1,aes-sha2_256,aes-md5,3des-sha1,3des-md5

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libreswanAffected
Red Hat Enterprise Linux 6libreswanNot affected
Red Hat Enterprise Linux 7libreswanOut of support scope
Red Hat Enterprise Linux 8libreswanFixedRHSA-2024:437608.07.2024
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportlibreswanFixedRHSA-2024:441709.07.2024
Red Hat Enterprise Linux 8.6 Telecommunications Update ServicelibreswanFixedRHSA-2024:441709.07.2024
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionslibreswanFixedRHSA-2024:441709.07.2024
Red Hat Enterprise Linux 8.8 Extended Update SupportlibreswanFixedRHSA-2024:420001.07.2024
Red Hat Enterprise Linux 9libreswanFixedRHSA-2024:405023.06.2024
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionslibreswanFixedRHSA-2024:437708.07.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-617
https://bugzilla.redhat.com/show_bug.cgi?id=2274448libreswan: IKEv1 default AH/ESP responder can crash and restart

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 1 года назад

The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not affected.

CVSS3: 6.5
nvd
около 1 года назад

The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not affected.

CVSS3: 6.5
msrc
около 1 года назад

Описание отсутствует

CVSS3: 6.5
debian
около 1 года назад

The Libreswan Project was notified of an issue causing libreswan to re ...

CVSS3: 6.5
redos
12 месяцев назад

Уязвимость libreswan

6.5 Medium

CVSS3