The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://download.strongswan.org/patches/08_snprintf_patch/strongswan-4.3.3_snprintf.patch - Patch | |
References | () http://download.strongswan.org/patches/08_snprintf_patch/strongswan-4.3.4_snprintf.patch - Patch | |
References | () http://download.strongswan.org/patches/08_snprintf_patch/strongswan-4.3.5_snprintf.patch - Patch | |
References | () http://download.strongswan.org/patches/08_snprintf_patch/strongswan-4.3.6_snprintf.patch - Patch | |
References | () http://download.strongswan.org/patches/08_snprintf_patch/strongswan-4.4.0_snprintf.patch - Patch | |
References | () http://lists.opensuse.org/opensuse-updates/2010-08/msg00026.html - | |
References | () http://secunia.com/advisories/40956 - Vendor Advisory | |
References | () http://trac.strongswan.org/projects/strongswan/wiki/441 - | |
References | () http://www.securityfocus.com/bid/42444 - Patch | |
References | () http://www.securitytracker.com/id?1024338 - | |
References | () http://www.vupen.com/english/advisories/2010/2085 - Patch, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/2086 - | |
References | () https://bugzilla.novell.com/615915 - | |
References | () https://lists.strongswan.org/pipermail/users/2010-August/005167.html - Patch, Vendor Advisory |
Information
Published : 2010-08-20 18:00
Updated : 2024-11-21 01:17
NVD link : CVE-2010-2628
Mitre link : CVE-2010-2628
CVE.ORG link : CVE-2010-2628
JSON object : View
Products Affected
strongswan
- strongswan
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')