CVE-2010-3752OS Command Injection in Openswan

Severity
6.5MEDIUMNVD
EPSS
0.6%
top 29.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 5
Latest updateMay 14

Description

programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerability than CVE-2010-3302.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 8.0 | Impact: 6.4

Affected Packages1 packages

NVDxelerance/openswan4 versions+3

Patches

🔴Vulnerability Details

1
GHSA
GHSA-46rf-hcw5-3qq2: programs/pluto/xauth2022-05-14

📋Vendor Advisories

1
Red Hat
Openswan: Gateway arbitrary code execution via shell metacharacters in cisco_dns_info or cisco_domain_info data in packet2010-09-27

💬Community

1
Bugzilla
CVE-2010-3752 Openswan: Gateway arbitrary code execution via shell metacharacters in cisco_dns_info or cisco_domain_info data in packet2010-10-06
CVE-2010-3752 — OS Command Injection in Openswan | cvebase