Rapid7 Vulnerability & Exploit Database

CentOS Linux: CVE-2019-12312: Low: libreswan security and bug fix update (CESA-2019:3391)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

CentOS Linux: CVE-2019-12312: Low: libreswan security and bug fix update (CESA-2019:3391)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
05/24/2019
Created
04/09/2020
Added
04/08/2020
Modified
05/25/2023

Description

In Libreswan 3.27 an assertion failure can lead to a pluto IKE daemon restart. An attacker can trigger a NULL pointer dereference by initiating an IKEv2 IKE_SA_INIT exchange, followed by a bogus INFORMATIONAL exchange instead of the normallly expected IKE_AUTH exchange. This affects send_v2N_spi_response_from_state() in programs/pluto/ikev2_send.c that will then trigger a NULL pointer dereference leading to a restart of libreswan.

Solution(s)

  • centos-upgrade-libreswan
  • centos-upgrade-libreswan-debuginfo
  • centos-upgrade-libreswan-debugsource

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;