First published: Mon Apr 17 2023(Updated: )
When an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender re-uses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. <a href="https://github.com/libreswan/libreswan/issues/1039">https://github.com/libreswan/libreswan/issues/1039</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Libreswan |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2187165 is classified as moderate.
The vulnerability REDHAT-BUG-2187165 affects Libreswan versions that utilize IKEv1 Aggressive Mode.
To fix REDHAT-BUG-2187165, you need to update to the latest version of Libreswan that addresses this vulnerability.
The potential risks of REDHAT-BUG-2187165 include possible denial of service or state machine confusion in the pluto daemon.
Currently, there are no documented workarounds for REDHAT-BUG-2187165, so updating is the recommended course of action.