CVE-2010-3753OS Command Injection in Openswan

Severity
6.5MEDIUMNVD
EPSS
0.6%
top 29.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 5
Latest updateMay 14

Description

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 8.0 | Impact: 6.4

Affected Packages1 packages

NVDxelerance/openswan2.6.26, 2.6.27, 2.6.28+2

Patches

🔴Vulnerability Details

1
GHSA
GHSA-3gm4-7p8j-w2h8: programs/pluto/xauth2022-05-14

📋Vendor Advisories

1
Red Hat
Openswan: Gateway arbitrary execution via shell metacharacters in the cisco_banner2010-09-27

💬Community

1
Bugzilla
CVE-2010-3753 Openswan: Gateway arbitrary execution via shell metacharacters in the cisco_banner2010-10-06
CVE-2010-3753 — OS Command Injection in Openswan | cvebase