CVE-2023-38710

An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:*

History

11 Dec 2023, 19:34

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 6.5

31 Aug 2023, 00:38

Type Values Removed Values Added
CPE cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:*
References (MISC) https://libreswan.org/security/CVE-2023-38710/ - (MISC) https://libreswan.org/security/CVE-2023-38710/ - Third Party Advisory
References (MISC) https://github.com/libreswan/libreswan/tags - (MISC) https://github.com/libreswan/libreswan/tags - Third Party Advisory
First Time Libreswan
Libreswan libreswan
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE NVD-CWE-noinfo

25 Aug 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-25 21:15

Updated : 2023-12-11 19:34


NVD link : CVE-2023-38710

Mitre link : CVE-2023-38710

CVE.ORG link : CVE-2023-38710


JSON object : View

Products Affected

libreswan

  • libreswan