Vulnerability Description
strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Strongswan | Strongswan | >= 5.3.0, < 5.9.12 |
Related Weaknesses (CWE)
References
- https://github.com/strongswan/strongswan/releasesRelease Notes
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-Vendor Advisory
- https://github.com/strongswan/strongswan/releasesRelease Notes
- https://lists.debian.org/debian-lts-announce/2023/11/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://security.netapp.com/advisory/ntap-20250117-0003/
- https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-Vendor Advisory
FAQ
What is CVE-2023-41913?
CVE-2023-41913 is a vulnerability with a CVSS score of 9.8 (CRITICAL). strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected...
How severe is CVE-2023-41913?
CVE-2023-41913 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-41913?
Check the references section above for vendor advisories and patch information. Affected products include: Strongswan Strongswan.