Vulnerability CVE-2010-3308


Published: 2010-10-05   Modified: 2012-02-13

Description:
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field.

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Xelerance -> Openswan 
Openswan -> Openswan 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html
http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt
http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch
http://www.redhat.com/support/errata/RHSA-2010-0892.html
http://www.securityfocus.com/bid/43588
http://www.securitytracker.com/id?1024749
http://www.vupen.com/english/advisories/2010/2526

Copyright 2024, cxsecurity.com

 

Back to Top