programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt - Vendor Advisory | |
References | () http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch - Patch | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0892.html - | |
References | () http://www.securityfocus.com/bid/43588 - | |
References | () http://www.securitytracker.com/id?1024749 - | |
References | () http://www.vupen.com/english/advisories/2010/2526 - Vendor Advisory |
Information
Published : 2010-10-05 22:00
Updated : 2024-11-21 01:19
NVD link : CVE-2010-3753
Mitre link : CVE-2010-3753
CVE.ORG link : CVE-2010-3753
JSON object : View
Products Affected
xelerance
- openswan
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')