Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2023-41913

Published: 20 November 2023

strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.

Notes

AuthorNote
mdeslaur
After the USN was published, it was discovered that the Ubuntu
packages aren't built with --enable-tkm, so the vulnerable code
isn't built at all. If this is enabled in the future, the
jammy and earlier patches (inlcuding esm) need to be fixed to use
diffie_hellman_verify_value() instead of
key_exchange_verify_pubkey() for those older versions.
Marking remaining releases as "not-affected"

Priority

Medium

Cvss 3 Severity Score

9.8

Score breakdown

Status

Package Release Status
strongswan
Launchpad, Ubuntu, Debian
bionic
Released (5.6.2-1ubuntu2.9+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
focal
Released (5.8.2-1ubuntu3.6)
jammy
Released (5.9.5-2ubuntu2.2)
lunar
Released (5.9.8-3ubuntu4.1)
mantic
Released (5.9.11-1ubuntu1.1)
trusty Not vulnerable
(code not compiled)
upstream
Released (5.9.12)
xenial
Released (5.3.5-1ubuntu3.8+esm4)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)

Severity score breakdown

Parameter Value
Base score 9.8
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H