Lucene search

K
mageiaGentoo FoundationMGASA-2023-0089
HistoryMar 11, 2023 - 10:00 p.m.

Updated libreswan packages fix security vulnerability

2023-03-1122:00:39
Gentoo Foundation
advisories.mageia.org
23
libreswan
packages
security
vulnerability
traffic selector
parsing
code
missing check
palformed
payloads
crash
restart
pluto daemon
remote code execution
cve-2023-23009
unix

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

53.6%

A change in the libreswan 4.2 Traffic Selector parsing code introduced a missing check that would reject palformed Traffic Selector payloads. As such, in such case the code stumbles on to hit a double free, leading to a crash and restart of the pluto daemon. No remote code execution. (CVE-2023-23009)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchlibreswan< 4.6-4.1libreswan-4.6-4.1.mga8

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

53.6%