CVE-2005-0162

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openswan:openswan:*:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:54

Type Values Removed Values Added
References () http://secunia.com/advisories/14038 - () http://secunia.com/advisories/14038 -
References () http://secunia.com/advisories/14062 - () http://secunia.com/advisories/14062 -
References () http://securitytracker.com/id?1013014 - () http://securitytracker.com/id?1013014 -
References () http://www.idefense.com/application/poi/display?id=190&type=vulnerabilities - Patch, Vendor Advisory () http://www.idefense.com/application/poi/display?id=190&type=vulnerabilities - Patch, Vendor Advisory
References () http://www.openswan.org/support/vuln/IDEF0785/ - Patch, Vendor Advisory () http://www.openswan.org/support/vuln/IDEF0785/ - Patch, Vendor Advisory
References () http://www.osvdb.org/13195 - () http://www.osvdb.org/13195 -
References () http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html - () http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html -
References () http://www.securityfocus.com/bid/12377 - () http://www.securityfocus.com/bid/12377 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19078 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/19078 -

Information

Published : 2005-01-26 05:00

Updated : 2024-11-20 23:54


NVD link : CVE-2005-0162

Mitre link : CVE-2005-0162

CVE.ORG link : CVE-2005-0162


JSON object : View

Products Affected

xelerance

  • openswan

openswan

  • openswan