Lucene search

K
redhatcveRedhat.comRH:CVE-2023-38710
HistoryAug 09, 2023 - 5:49 a.m.

CVE-2023-38710

2023-08-0905:49:30
redhat.com
access.redhat.com
15
libreswan package
assertion failure
ikev2 rekey
invalid ipsec protocol id
invalid_spi
malicious client
denial of service

0.0004 Low

EPSS

Percentile

12.6%

An assertion failure flaw was found in the Libreswan package that occurs when processing IKEv2 REKEY requests. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notification INVALID_SPI is sent back. The notify payload’s protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3). This flaw allows a malicious client or attacker to send a malformed IKEv2 REKEY packet, causing a crash and restarting the libreswan pluto daemon. When sent continuously, this could lead to a denial of service attack.