An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.
History

Mon, 02 Dec 2024 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel E4s
CPEs cpe:/a:redhat:rhel_e4s:9.0
Vendors & Products Redhat rhel E4s

Tue, 26 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2023-08-25T00:00:00

Updated: 2024-11-26T21:53:27.752Z

Reserved: 2023-07-24T00:00:00

Link: CVE-2023-38710

cve-icon Vulnrichment

Updated: 2024-08-02T17:46:56.611Z

cve-icon NVD

Status : Modified

Published: 2023-08-25T21:15:08.167

Modified: 2024-11-21T08:14:06.133

Link: CVE-2023-38710

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-08-08T00:00:00Z

Links: CVE-2023-38710 - Bugzilla