Vulnerability CVE-2010-3302


Published: 2010-10-05   Modified: 2012-02-13

Description:
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a packet.

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Xelerance -> Openswan 
Openswan -> Openswan 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html
http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt
http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch
http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch
http://www.redhat.com/support/errata/RHSA-2010-0892.html
http://www.securityfocus.com/bid/43588
http://www.securitytracker.com/id?1024749
http://www.vupen.com/english/advisories/2010/2526

Copyright 2024, cxsecurity.com

 

Back to Top