跳转到帖子

Oracle Linux: CVE-2024-3652: ELSA-2024-4376: libreswan security update (MODERATE) (Multiple Advisories)

recommended_posts

发布于
  • Members

Oracle Linux: CVE-2024-3652: ELSA-2024-4376:libreswan security update (MODERATE) (Multiple Advisories)

Severity
7
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:C)
Published
04/15/2024
Created
06/26/2024
Added
06/24/2024
Modified
01/07/2025

Description

The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not affected. A flaw was found in Libreswan, where it was identified to contain an assertion failure issue in the compute_proto_keymat() function. The vulnerability can be exploited when an IKEv1 connection is loaded with an AH/ESP default setting when no esp= line is present in the connection. This flaw allows an authenticated attacker to send the bogus AES-GMAC proposal request, triggering the issue and causing Libreswan to crash and restart. When this connection is automatically added on startup using the auto= keyword, it can cause repeated crashes, leading to a denial of service. No remote code execution is possible.

Solution(s)

  • oracle-linux-upgrade-libreswan

References

  • https://attackerkb.com/topics/cve-2024-3652
  • CVE - 2024-3652
  • ELSA-2024-4376
  • ELSA-2024-4050
  • 查看数 707
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…