CVE-2023-38710 — Reachable Assertion in Libreswan
Severity
6.5MEDIUMNVD
EPSS
0.1%
top 80.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 25
Description
An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6
Affected Packages10 packages
🔴Vulnerability Details
3📋Vendor Advisories
3Microsoft▶
An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1 an error notify INVALID_SPI is sent back. The notify payloa↗2023-08-08
Debian▶
CVE-2023-38710: libreswan - An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY p...↗2023