CVE-2023-2295

A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. This CVE exists because of a CVE-2023-30570 security regression for libreswan package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libreswan:libreswan:4.9-1.el8:*:*:*:*:*:*:*
cpe:2.3:a:libreswan:libreswan:4.9-1.el9:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*

History

25 May 2023, 17:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:a:libreswan:libreswan:4.9-1.el9:*:*:*:*:*:*:*
cpe:2.3:a:libreswan:libreswan:4.9-1.el8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.8:*:*:*:*:*:*:*
First Time Libreswan libreswan
Redhat enterprise Linux Eus
Redhat enterprise Linux
Redhat enterprise Linux Server Tus
Redhat enterprise Linux Server Aus
Libreswan
Redhat
CWE NVD-CWE-noinfo
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2189777 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2189777 - Issue Tracking
References (MISC) https://access.redhat.com/errata/RHSA-2023:3148 - (MISC) https://access.redhat.com/errata/RHSA-2023:3148 - Third Party Advisory
References (MISC) https://access.redhat.com/security/cve/CVE-2023-2295 - (MISC) https://access.redhat.com/security/cve/CVE-2023-2295 - Third Party Advisory
References (MISC) https://access.redhat.com/errata/RHSA-2023:3107 - (MISC) https://access.redhat.com/errata/RHSA-2023:3107 - Third Party Advisory

17 May 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-17 23:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-2295

Mitre link : CVE-2023-2295

CVE.ORG link : CVE-2023-2295


JSON object : View

Products Affected

libreswan

  • libreswan

redhat

  • enterprise_linux
  • enterprise_linux_server_aus
  • enterprise_linux_server_tus
  • enterprise_linux_eus
CWE
NVD-CWE-noinfo CWE-400

Uncontrolled Resource Consumption