Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html - | |
References | () http://secunia.com/advisories/41769 - | |
References | () http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt - Vendor Advisory | |
References | () http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch - Patch | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0892.html - | |
References | () http://www.securityfocus.com/bid/43588 - | |
References | () http://www.securitytracker.com/id?1024749 - | |
References | () http://www.vupen.com/english/advisories/2010/2526 - Vendor Advisory |
Information
Published : 2010-10-05 22:00
Updated : 2024-11-21 01:18
NVD link : CVE-2010-3308
Mitre link : CVE-2010-3308
CVE.ORG link : CVE-2010-3308
JSON object : View
Products Affected
xelerance
- openswan
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')