Resource Exhaustion Affecting libreswan/libreswan package, versions [3.22,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Resource Exhaustion vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-LIBRESWANLIBRESWAN-6596758
  • published11 Apr 2024
  • disclosed11 Apr 2024
  • creditX1AOxiang

Introduced: 11 Apr 2024

CVE-2024-3652  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

There is no fixed version for libreswan/libreswan.

Overview

Affected versions of this package are vulnerable to Resource Exhaustion due to the default proposal handler's handling of AES-GMAC requests in IKEv1 connections. An attacker can cause the software to crash and restart by sending a crafted request that triggers an assertion failure. This issue does not affect IKEv2 connections.

Workaround

This vulnerability can be mitigated by adding an esp= line to all IKEv1 connections, specifying common default configurations such as: esp=aes-sha2_512, aes-sha1, aes-sha2_256,aes-md5, 3des-sha1, 3des-md5.

References

CVSS Scores

version 3.1