CVE-2024-3652Improper Resource Shutdown or Release in Libreswan

Severity
6.5MEDIUMNVD
EPSS
0.0%
top 91.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 11
Latest updateApr 15

Description

The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not affected.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages9 packages

CVEListV5the_libreswan_project/libreswan3.224.14
debiandebian/libreswan< libreswan 4.15-1 (forky)
NVDlibreswan/libreswan3.224.15
Debianlibreswan/libreswan< 4.15-1+1

🔴Vulnerability Details

2
GHSA
GHSA-395v-96gv-76w3: The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line2024-04-11
OSV
CVE-2024-3652: The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line2024-04-11

📋Vendor Advisories

3
Red Hat
libreswan: IKEv1 default AH/ESP responder can crash and restart2024-04-15
Microsoft
IKEv1 default AH/ESP responder can cause libreswan to abort and restart2024-04-09
Debian
CVE-2024-3652: libreswan - The Libreswan Project was notified of an issue causing libreswan to restart when...2024