CVE-2010-3752

programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerability than CVE-2010-3302.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*

History

21 Nov 2024, 01:19

Type Values Removed Values Added
References () http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt - Vendor Advisory () http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt - Vendor Advisory
References () http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch - Patch () http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch - Patch
References () http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch - Patch () http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch - Patch
References () http://www.redhat.com/support/errata/RHSA-2010-0892.html - () http://www.redhat.com/support/errata/RHSA-2010-0892.html -
References () http://www.securityfocus.com/bid/43588 - () http://www.securityfocus.com/bid/43588 -
References () http://www.securitytracker.com/id?1024749 - () http://www.securitytracker.com/id?1024749 -
References () http://www.vupen.com/english/advisories/2010/2526 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/2526 - Vendor Advisory

Information

Published : 2010-10-05 22:00

Updated : 2024-11-21 01:19


NVD link : CVE-2010-3752

Mitre link : CVE-2010-3752

CVE.ORG link : CVE-2010-3752


JSON object : View

Products Affected

xelerance

  • openswan
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')