Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/14038 - | |
References | () http://secunia.com/advisories/14062 - | |
References | () http://securitytracker.com/id?1013014 - | |
References | () http://www.idefense.com/application/poi/display?id=190&type=vulnerabilities - Patch, Vendor Advisory | |
References | () http://www.openswan.org/support/vuln/IDEF0785/ - Patch, Vendor Advisory | |
References | () http://www.osvdb.org/13195 - | |
References | () http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html - | |
References | () http://www.securityfocus.com/bid/12377 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19078 - |
Information
Published : 2005-01-26 05:00
Updated : 2024-11-20 23:54
NVD link : CVE-2005-0162
Mitre link : CVE-2005-0162
CVE.ORG link : CVE-2005-0162
JSON object : View
Products Affected
xelerance
- openswan
openswan
- openswan
CWE