First published: Fri May 24 2019(Updated: )
In Libreswan 3.27 an assertion failure can lead to a pluto IKE daemon restart. An attacker can trigger a NULL pointer dereference by initiating an IKEv2 IKE_SA_INIT exchange, followed by a bogus INFORMATIONAL exchange instead of the normallly expected IKE_AUTH exchange. This affects send_v2N_spi_response_from_state() in programs/pluto/ikev2_send.c that will then trigger a NULL pointer dereference leading to a restart of libreswan.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libreswan Libreswan | <3.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12312 is a vulnerability in Libreswan 3.27 that can lead to a pluto IKE daemon restart.
CVE-2019-12312 occurs when an attacker initiates an IKEv2 IKE_SA_INIT exchange, followed by a bogus INFORMATIONAL exchange instead of the normally expected IKE_AUTH exchange.
The severity of CVE-2019-12312 is 7.5 (High).
An attacker can exploit CVE-2019-12312 by triggering a NULL pointer dereference through the specific sequence of IKEv2 exchanges.
Yes, upgrading to Libreswan version 3.28 or later fixes CVE-2019-12312.