Severity
6.5MEDIUMNVD
EPSS
4.7%
top 10.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 5
Latest updateMay 14

Description

Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 8.0 | Impact: 6.4

Affected Packages1 packages

NVDxelerance/openswan2.6.26, 2.6.27, 2.6.28+2

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3gm4-7p8j-w2h8: programs/pluto/xauth2022-05-14
GHSA
GHSA-j8v8-55qm-66h6: Buffer overflow in programs/pluto/xauth2022-05-14

📋Vendor Advisories

2
Red Hat
Openswan: Gateway arbitrary execution via shell metacharacters in the cisco_banner2010-09-27
Red Hat
Openswan cisco banner option handling vulnerability2010-09-27

💬Community

5
Bugzilla
CVE-2010-3752 Openswan: Gateway arbitrary code execution via shell metacharacters in cisco_dns_info or cisco_domain_info data in packet2010-10-06
Bugzilla
CVE-2010-3753 Openswan: Gateway arbitrary execution via shell metacharacters in the cisco_banner2010-10-06
Bugzilla
CVE-2010-3308 CVE-2010-3302 openswan various flaws [fedora-all]2010-09-27
Bugzilla
CVE-2010-3308 Openswan cisco banner option handling vulnerability2010-09-27
Bugzilla
CVE-2010-3302 openswan: buffer overflow vulnerability in XAUTH client-side support2010-09-15
CVE-2010-3308 — Code Injection in Xelerance Openswan | cvebase