Vulnerabilites related to xelerance - openswan
CVE-2010-3753 (GCVE-0-2010-3753)
Vulnerability from cvelistv5
Published
2010-10-05 21:00
Modified
2024-08-07 03:18
Severity ?
CWE
  • n/a
Summary
programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:18:53.060Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2010-2526",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2526"
          },
          {
            "name": "43588",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43588"
          },
          {
            "name": "RHSA-2010:0892",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
          },
          {
            "name": "1024749",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1024749"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-09-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-12-07T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2010-2526",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2526"
        },
        {
          "name": "43588",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43588"
        },
        {
          "name": "RHSA-2010:0892",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
        },
        {
          "name": "1024749",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1024749"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3753",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2010-2526",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/2526"
            },
            {
              "name": "43588",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43588"
            },
            {
              "name": "RHSA-2010:0892",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
            },
            {
              "name": "1024749",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1024749"
            },
            {
              "name": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch",
              "refsource": "CONFIRM",
              "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
            },
            {
              "name": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt",
              "refsource": "CONFIRM",
              "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3753",
    "datePublished": "2010-10-05T21:00:00",
    "dateReserved": "2010-10-05T00:00:00",
    "dateUpdated": "2024-08-07T03:18:53.060Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-3671 (GCVE-0-2005-3671)
Vulnerability from cvelistv5
Published
2005-11-18 21:00
Modified
2024-08-07 23:17
Severity ?
CWE
  • n/a
Summary
The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:17:23.402Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en"
          },
          {
            "name": "15416",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15416"
          },
          {
            "name": "FEDORA-2005-1093",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html"
          },
          {
            "name": "1015214",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015214"
          },
          {
            "name": "17581",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17581"
          },
          {
            "name": "20051214 Re:  [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://jvn.jp/niscc/NISCC-273756/index.html"
          },
          {
            "name": "20051213 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html"
          },
          {
            "name": "GLSA-200512-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/"
          },
          {
            "name": "VU#226364",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/226364"
          },
          {
            "name": "18115",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18115"
          },
          {
            "name": "17680",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17680"
          },
          {
            "name": "FEDORA-2005-1092",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/niscc2/"
          },
          {
            "name": "17980",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17980"
          },
          {
            "name": "SUSE-SA:2005:070",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_70_ipsec.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-11-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-24T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en"
        },
        {
          "name": "15416",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15416"
        },
        {
          "name": "FEDORA-2005-1093",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html"
        },
        {
          "name": "1015214",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015214"
        },
        {
          "name": "17581",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17581"
        },
        {
          "name": "20051214 Re:  [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://jvn.jp/niscc/NISCC-273756/index.html"
        },
        {
          "name": "20051213 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html"
        },
        {
          "name": "GLSA-200512-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/"
        },
        {
          "name": "VU#226364",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/226364"
        },
        {
          "name": "18115",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18115"
        },
        {
          "name": "17680",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17680"
        },
        {
          "name": "FEDORA-2005-1092",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/niscc2/"
        },
        {
          "name": "17980",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17980"
        },
        {
          "name": "SUSE-SA:2005:070",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_70_ipsec.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3671",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en",
              "refsource": "MISC",
              "url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en"
            },
            {
              "name": "15416",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15416"
            },
            {
              "name": "FEDORA-2005-1093",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html"
            },
            {
              "name": "1015214",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015214"
            },
            {
              "name": "17581",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17581"
            },
            {
              "name": "20051214 Re:  [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html"
            },
            {
              "name": "http://jvn.jp/niscc/NISCC-273756/index.html",
              "refsource": "MISC",
              "url": "http://jvn.jp/niscc/NISCC-273756/index.html"
            },
            {
              "name": "20051213 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html"
            },
            {
              "name": "GLSA-200512-04",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml"
            },
            {
              "name": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/",
              "refsource": "MISC",
              "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/"
            },
            {
              "name": "VU#226364",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/226364"
            },
            {
              "name": "18115",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18115"
            },
            {
              "name": "17680",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17680"
            },
            {
              "name": "FEDORA-2005-1092",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html"
            },
            {
              "name": "http://www.openswan.org/niscc2/",
              "refsource": "CONFIRM",
              "url": "http://www.openswan.org/niscc2/"
            },
            {
              "name": "17980",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17980"
            },
            {
              "name": "SUSE-SA:2005:070",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_70_ipsec.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3671",
    "datePublished": "2005-11-18T21:00:00",
    "dateReserved": "2005-11-18T00:00:00",
    "dateUpdated": "2024-08-07T23:17:23.402Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-10155 (GCVE-0-2019-10155)
Vulnerability from cvelistv5
Published
2019-06-12 13:51
Modified
2024-08-04 22:10
CWE
Summary
The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:10:09.974Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://libreswan.org/security/CVE-2019-10155/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155"
          },
          {
            "name": "FEDORA-2019-f7fb531958",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LFGPGLLKAXSLWFI62A6BZHTZSCHRCBXS/"
          },
          {
            "name": "FEDORA-2019-1bd9cfb718",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUEXFCN7FAYBKJBQJLYCEUQUCHDEJRZW/"
          },
          {
            "name": "RHSA-2019:3391",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3391"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "libreswan",
          "vendor": "the libreswan Project",
          "versions": [
            {
              "status": "affected",
              "version": "3.29"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-354",
              "description": "CWE-354",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-06T00:07:32",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://libreswan.org/security/CVE-2019-10155/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155"
        },
        {
          "name": "FEDORA-2019-f7fb531958",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LFGPGLLKAXSLWFI62A6BZHTZSCHRCBXS/"
        },
        {
          "name": "FEDORA-2019-1bd9cfb718",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUEXFCN7FAYBKJBQJLYCEUQUCHDEJRZW/"
        },
        {
          "name": "RHSA-2019:3391",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3391"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2019-10155",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "libreswan",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "3.29"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "the libreswan Project"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29."
            }
          ]
        },
        "impact": {
          "cvss": [
            [
              {
                "vectorString": "3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
                "version": "3.0"
              }
            ]
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-354"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://libreswan.org/security/CVE-2019-10155/",
              "refsource": "MISC",
              "url": "https://libreswan.org/security/CVE-2019-10155/"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155"
            },
            {
              "name": "FEDORA-2019-f7fb531958",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFGPGLLKAXSLWFI62A6BZHTZSCHRCBXS/"
            },
            {
              "name": "FEDORA-2019-1bd9cfb718",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUEXFCN7FAYBKJBQJLYCEUQUCHDEJRZW/"
            },
            {
              "name": "RHSA-2019:3391",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3391"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2019-10155",
    "datePublished": "2019-06-12T13:51:01",
    "dateReserved": "2019-03-27T00:00:00",
    "dateUpdated": "2024-08-04T22:10:09.974Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-4190 (GCVE-0-2008-4190)
Vulnerability from cvelistv5
Published
2008-09-24 10:00
Modified
2024-08-07 10:08
Severity ?
CWE
  • n/a
Summary
The IPSEC livetest tool in Openswan 2.4.12 and earlier, and 2.6.x through 2.6.16, allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack on the (1) ipseclive.conn and (2) ipsec.olts.remote.log temporary files. NOTE: in many distributions and the upstream version, this tool has been disabled.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:08:34.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "34472",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34472"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460425"
          },
          {
            "name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
          },
          {
            "name": "20090309 Re: [ GLSA 200903-18 ] Openswan: Insecure temporary file creation",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/501624/100/0/threaded"
          },
          {
            "name": "34182",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34182"
          },
          {
            "name": "20090310 Re: [ GLSA 200903-18 ] Openswan: Insecure temporary file creation",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/501640/100/0/threaded"
          },
          {
            "name": "oval:org.mitre.oval:def:10078",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10078"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.gentoo.org/~rbu/security/debiantemp/openswan"
          },
          {
            "name": "31243",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31243"
          },
          {
            "name": "9135",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/9135"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374"
          },
          {
            "name": "RHSA-2009:0402",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html"
          },
          {
            "name": "openswan-livetest-symlink(45250)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45250"
          },
          {
            "name": "DSA-1760",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1760"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-08-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The IPSEC livetest tool in Openswan 2.4.12 and earlier, and 2.6.x through 2.6.16, allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack on the (1) ipseclive.conn and (2) ipsec.olts.remote.log temporary files.  NOTE: in many distributions and the upstream version, this tool has been disabled."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "34472",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34472"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460425"
        },
        {
          "name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
        },
        {
          "name": "20090309 Re: [ GLSA 200903-18 ] Openswan: Insecure temporary file creation",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/501624/100/0/threaded"
        },
        {
          "name": "34182",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34182"
        },
        {
          "name": "20090310 Re: [ GLSA 200903-18 ] Openswan: Insecure temporary file creation",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/501640/100/0/threaded"
        },
        {
          "name": "oval:org.mitre.oval:def:10078",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10078"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.gentoo.org/~rbu/security/debiantemp/openswan"
        },
        {
          "name": "31243",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31243"
        },
        {
          "name": "9135",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/9135"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374"
        },
        {
          "name": "RHSA-2009:0402",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html"
        },
        {
          "name": "openswan-livetest-symlink(45250)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45250"
        },
        {
          "name": "DSA-1760",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1760"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4190",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IPSEC livetest tool in Openswan 2.4.12 and earlier, and 2.6.x through 2.6.16, allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack on the (1) ipseclive.conn and (2) ipsec.olts.remote.log temporary files.  NOTE: in many distributions and the upstream version, this tool has been disabled."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "34472",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34472"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=460425",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460425"
            },
            {
              "name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
            },
            {
              "name": "https://bugs.gentoo.org/show_bug.cgi?id=235770",
              "refsource": "CONFIRM",
              "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
            },
            {
              "name": "20090309 Re: [ GLSA 200903-18 ] Openswan: Insecure temporary file creation",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/501624/100/0/threaded"
            },
            {
              "name": "34182",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34182"
            },
            {
              "name": "20090310 Re: [ GLSA 200903-18 ] Openswan: Insecure temporary file creation",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/501640/100/0/threaded"
            },
            {
              "name": "oval:org.mitre.oval:def:10078",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10078"
            },
            {
              "name": "http://dev.gentoo.org/~rbu/security/debiantemp/openswan",
              "refsource": "CONFIRM",
              "url": "http://dev.gentoo.org/~rbu/security/debiantemp/openswan"
            },
            {
              "name": "31243",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31243"
            },
            {
              "name": "9135",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/9135"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374"
            },
            {
              "name": "RHSA-2009:0402",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html"
            },
            {
              "name": "openswan-livetest-symlink(45250)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45250"
            },
            {
              "name": "DSA-1760",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1760"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4190",
    "datePublished": "2008-09-24T10:00:00",
    "dateReserved": "2008-09-23T00:00:00",
    "dateUpdated": "2024-08-07T10:08:34.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-6466 (GCVE-0-2013-6466)
Vulnerability from cvelistv5
Published
2014-01-26 20:00
Modified
2024-08-06 17:39
Severity ?
CWE
  • n/a
Summary
Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:39:01.444Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt"
          },
          {
            "name": "65155",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65155"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories/vde-2017-001"
          },
          {
            "name": "RHSA-2014:0185",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html"
          },
          {
            "name": "DSA-2893",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2893"
          },
          {
            "name": "openswan-cve20136466-dos(90524)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-05-16T13:57:02",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt"
        },
        {
          "name": "65155",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65155"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert.vde.com/en-us/advisories/vde-2017-001"
        },
        {
          "name": "RHSA-2014:0185",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html"
        },
        {
          "name": "DSA-2893",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2893"
        },
        {
          "name": "openswan-cve20136466-dos(90524)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-6466",
    "datePublished": "2014-01-26T20:00:00",
    "dateReserved": "2013-11-04T00:00:00",
    "dateUpdated": "2024-08-06T17:39:01.444Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-3302 (GCVE-0-2010-3302)
Vulnerability from cvelistv5
Published
2010-10-05 21:00
Modified
2024-08-07 03:03
Severity ?
CWE
  • n/a
Summary
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a packet.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:03:18.957Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "41769",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/41769"
          },
          {
            "name": "ADV-2010-2526",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2526"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt"
          },
          {
            "name": "43588",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43588"
          },
          {
            "name": "RHSA-2010:0892",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
          },
          {
            "name": "1024749",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1024749"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch"
          },
          {
            "name": "FEDORA-2010-15508",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html"
          },
          {
            "name": "FEDORA-2010-15381",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html"
          },
          {
            "name": "FEDORA-2010-15516",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-09-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-11-03T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "41769",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/41769"
        },
        {
          "name": "ADV-2010-2526",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2526"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt"
        },
        {
          "name": "43588",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43588"
        },
        {
          "name": "RHSA-2010:0892",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
        },
        {
          "name": "1024749",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1024749"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch"
        },
        {
          "name": "FEDORA-2010-15508",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html"
        },
        {
          "name": "FEDORA-2010-15381",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html"
        },
        {
          "name": "FEDORA-2010-15516",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-3302",
    "datePublished": "2010-10-05T21:00:00",
    "dateReserved": "2010-09-13T00:00:00",
    "dateUpdated": "2024-08-07T03:03:18.957Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0162 (GCVE-0-2005-0162)
Vulnerability from cvelistv5
Published
2005-01-29 05:00
Modified
2024-08-07 21:05
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.
References
http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html vendor-advisory, x_refsource_FEDORA
http://securitytracker.com/id?1013014 vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/12377 vdb-entry, x_refsource_BID
http://www.idefense.com/application/poi/display?id=190&type=vulnerabilities third-party-advisory, x_refsource_IDEFENSE
https://exchange.xforce.ibmcloud.com/vulnerabilities/19078 vdb-entry, x_refsource_XF
http://secunia.com/advisories/14062 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/14038 third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/13195 vdb-entry, x_refsource_OSVDB
http://www.openswan.org/support/vuln/IDEF0785/ x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:05:24.748Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2005-082",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html"
          },
          {
            "name": "1013014",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1013014"
          },
          {
            "name": "12377",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12377"
          },
          {
            "name": "20050126 Openswan XAUTH/PAM Buffer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=190\u0026type=vulnerabilities"
          },
          {
            "name": "openswan-xauth-pam-bo(19078)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19078"
          },
          {
            "name": "14062",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/14062"
          },
          {
            "name": "14038",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/14038"
          },
          {
            "name": "13195",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/13195"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/support/vuln/IDEF0785/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-01-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "FEDORA-2005-082",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html"
        },
        {
          "name": "1013014",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1013014"
        },
        {
          "name": "12377",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12377"
        },
        {
          "name": "20050126 Openswan XAUTH/PAM Buffer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=190\u0026type=vulnerabilities"
        },
        {
          "name": "openswan-xauth-pam-bo(19078)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19078"
        },
        {
          "name": "14062",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/14062"
        },
        {
          "name": "14038",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/14038"
        },
        {
          "name": "13195",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/13195"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/support/vuln/IDEF0785/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0162",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2005-082",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html"
            },
            {
              "name": "1013014",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1013014"
            },
            {
              "name": "12377",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12377"
            },
            {
              "name": "20050126 Openswan XAUTH/PAM Buffer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=190\u0026type=vulnerabilities"
            },
            {
              "name": "openswan-xauth-pam-bo(19078)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19078"
            },
            {
              "name": "14062",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/14062"
            },
            {
              "name": "14038",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/14038"
            },
            {
              "name": "13195",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/13195"
            },
            {
              "name": "http://www.openswan.org/support/vuln/IDEF0785/",
              "refsource": "CONFIRM",
              "url": "http://www.openswan.org/support/vuln/IDEF0785/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0162",
    "datePublished": "2005-01-29T05:00:00",
    "dateReserved": "2005-01-27T00:00:00",
    "dateUpdated": "2024-08-07T21:05:24.748Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-3308 (GCVE-0-2010-3308)
Vulnerability from cvelistv5
Published
2010-10-05 21:00
Modified
2024-08-07 03:03
Severity ?
CWE
  • n/a
Summary
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:03:18.859Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "41769",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/41769"
          },
          {
            "name": "ADV-2010-2526",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2526"
          },
          {
            "name": "43588",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43588"
          },
          {
            "name": "RHSA-2010:0892",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
          },
          {
            "name": "1024749",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1024749"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
          },
          {
            "name": "FEDORA-2010-15508",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html"
          },
          {
            "name": "FEDORA-2010-15381",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html"
          },
          {
            "name": "FEDORA-2010-15516",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-09-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-11-03T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "41769",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/41769"
        },
        {
          "name": "ADV-2010-2526",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2526"
        },
        {
          "name": "43588",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43588"
        },
        {
          "name": "RHSA-2010:0892",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
        },
        {
          "name": "1024749",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1024749"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
        },
        {
          "name": "FEDORA-2010-15508",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html"
        },
        {
          "name": "FEDORA-2010-15381",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html"
        },
        {
          "name": "FEDORA-2010-15516",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-3308",
    "datePublished": "2010-10-05T21:00:00",
    "dateReserved": "2010-09-13T00:00:00",
    "dateUpdated": "2024-08-07T03:03:18.859Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-3752 (GCVE-0-2010-3752)
Vulnerability from cvelistv5
Published
2010-10-05 21:00
Modified
2024-08-07 03:18
Severity ?
CWE
  • n/a
Summary
programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerability than CVE-2010-3302.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:18:53.149Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2010-2526",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2526"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt"
          },
          {
            "name": "43588",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43588"
          },
          {
            "name": "RHSA-2010:0892",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
          },
          {
            "name": "1024749",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1024749"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-09-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerability than CVE-2010-3302."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-12-07T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2010-2526",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2526"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt"
        },
        {
          "name": "43588",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43588"
        },
        {
          "name": "RHSA-2010:0892",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
        },
        {
          "name": "1024749",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1024749"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3752",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerability than CVE-2010-3302."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2010-2526",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/2526"
            },
            {
              "name": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt",
              "refsource": "CONFIRM",
              "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt"
            },
            {
              "name": "43588",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43588"
            },
            {
              "name": "RHSA-2010:0892",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
            },
            {
              "name": "1024749",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1024749"
            },
            {
              "name": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch",
              "refsource": "CONFIRM",
              "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
            },
            {
              "name": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch",
              "refsource": "CONFIRM",
              "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3752",
    "datePublished": "2010-10-05T21:00:00",
    "dateReserved": "2010-10-05T00:00:00",
    "dateUpdated": "2024-08-07T03:18:53.149Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-4073 (GCVE-0-2011-4073)
Vulnerability from cvelistv5
Published
2011-11-17 19:00
Modified
2024-08-06 23:53
Severity ?
CWE
  • n/a
Summary
Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions.
References
http://secunia.com/advisories/47342 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/50440 vdb-entry, x_refsource_BID
http://www.debian.org/security/2011/dsa-2374 vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/46678 third-party-advisory, x_refsource_SECUNIA
http://www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2011-1422.html vendor-advisory, x_refsource_REDHAT
http://www.securitytracker.com/id?1026268 vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/46681 third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:53:32.636Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "47342",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/47342"
          },
          {
            "name": "50440",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/50440"
          },
          {
            "name": "DSA-2374",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2374"
          },
          {
            "name": "46678",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46678"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt"
          },
          {
            "name": "RHSA-2011:1422",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-1422.html"
          },
          {
            "name": "1026268",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026268"
          },
          {
            "name": "46681",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46681"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-10-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-12-13T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "47342",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/47342"
        },
        {
          "name": "50440",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/50440"
        },
        {
          "name": "DSA-2374",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2374"
        },
        {
          "name": "46678",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46678"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt"
        },
        {
          "name": "RHSA-2011:1422",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-1422.html"
        },
        {
          "name": "1026268",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026268"
        },
        {
          "name": "46681",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46681"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-4073",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "47342",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/47342"
            },
            {
              "name": "50440",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/50440"
            },
            {
              "name": "DSA-2374",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2374"
            },
            {
              "name": "46678",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/46678"
            },
            {
              "name": "http://www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt",
              "refsource": "CONFIRM",
              "url": "http://www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt"
            },
            {
              "name": "RHSA-2011:1422",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-1422.html"
            },
            {
              "name": "1026268",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026268"
            },
            {
              "name": "46681",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/46681"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-4073",
    "datePublished": "2011-11-17T19:00:00",
    "dateReserved": "2011-10-18T00:00:00",
    "dateUpdated": "2024-08-06T23:53:32.636Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-2053 (GCVE-0-2013-2053)
Vulnerability from cvelistv5
Published
2013-07-09 17:00
Modified
2024-08-06 15:20
Severity ?
CWE
  • n/a
Summary
Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:20:37.420Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.openswan.org/news/13"
          },
          {
            "name": "SUSE-SU-2013:1150",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html"
          },
          {
            "name": "RHSA-2013:0827",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0827.html"
          },
          {
            "name": "59838",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/59838"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960229"
          },
          {
            "name": "[Swan-announce] 20130514 CVE-2013-2052: Libreswan remote buffer overflow in atodn()",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html"
          },
          {
            "name": "DSA-2893",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-2893"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-05-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records.  NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-04-10T14:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.openswan.org/news/13"
        },
        {
          "name": "SUSE-SU-2013:1150",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html"
        },
        {
          "name": "RHSA-2013:0827",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0827.html"
        },
        {
          "name": "59838",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/59838"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960229"
        },
        {
          "name": "[Swan-announce] 20130514 CVE-2013-2052: Libreswan remote buffer overflow in atodn()",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html"
        },
        {
          "name": "DSA-2893",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-2893"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-2053",
    "datePublished": "2013-07-09T17:00:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:20:37.420Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2185 (GCVE-0-2009-2185)
Vulnerability from cvelistv5
Published
2009-06-24 23:00
Modified
2024-08-07 05:44
Severity ?
CWE
  • n/a
Summary
The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string.
References
http://www.vupen.com/english/advisories/2009/1639 vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/35740 third-party-advisory, x_refsource_SECUNIA
http://www.ingate.com/Relnote.php?ver=481 x_refsource_CONFIRM
http://www.securitytracker.com/id?1022428 vdb-entry, x_refsource_SECTRACK
http://www.redhat.com/support/errata/RHSA-2009-1138.html vendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2009/1706 vdb-entry, x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079 vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/36950 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/35522 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/36922 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/37504 third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1899 vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/35452 vdb-entry, x_refsource_BID
http://download.strongswan.org/CHANGES42.txt x_refsource_CONFIRM
http://download.strongswan.org/CHANGES2.txt x_refsource_CONFIRM
http://up2date.astaro.com/2009/07/up2date_7404_released.html x_refsource_CONFIRM
http://www.debian.org/security/2009/dsa-1898 vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2009/1829 vdb-entry, x_refsource_VUPEN
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/35698 third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3354 vdb-entry, x_refsource_VUPEN
http://download.strongswan.org/CHANGES4.txt x_refsource_CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/35804 third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:44:55.585Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2009-1639",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1639"
          },
          {
            "name": "35740",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35740"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ingate.com/Relnote.php?ver=481"
          },
          {
            "name": "1022428",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022428"
          },
          {
            "name": "RHSA-2009:1138",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1138.html"
          },
          {
            "name": "ADV-2009-1706",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1706"
          },
          {
            "name": "oval:org.mitre.oval:def:11079",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079"
          },
          {
            "name": "36950",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36950"
          },
          {
            "name": "35522",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35522"
          },
          {
            "name": "36922",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36922"
          },
          {
            "name": "37504",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37504"
          },
          {
            "name": "DSA-1899",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1899"
          },
          {
            "name": "35452",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35452"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://download.strongswan.org/CHANGES42.txt"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://download.strongswan.org/CHANGES2.txt"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://up2date.astaro.com/2009/07/up2date_7404_released.html"
          },
          {
            "name": "DSA-1898",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1898"
          },
          {
            "name": "ADV-2009-1829",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1829"
          },
          {
            "name": "FEDORA-2009-7478",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html"
          },
          {
            "name": "35698",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35698"
          },
          {
            "name": "ADV-2009-3354",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3354"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://download.strongswan.org/CHANGES4.txt"
          },
          {
            "name": "FEDORA-2009-7423",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html"
          },
          {
            "name": "35804",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35804"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-06-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2009-1639",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1639"
        },
        {
          "name": "35740",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35740"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ingate.com/Relnote.php?ver=481"
        },
        {
          "name": "1022428",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022428"
        },
        {
          "name": "RHSA-2009:1138",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1138.html"
        },
        {
          "name": "ADV-2009-1706",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1706"
        },
        {
          "name": "oval:org.mitre.oval:def:11079",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079"
        },
        {
          "name": "36950",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36950"
        },
        {
          "name": "35522",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35522"
        },
        {
          "name": "36922",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36922"
        },
        {
          "name": "37504",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37504"
        },
        {
          "name": "DSA-1899",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1899"
        },
        {
          "name": "35452",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35452"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://download.strongswan.org/CHANGES42.txt"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://download.strongswan.org/CHANGES2.txt"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://up2date.astaro.com/2009/07/up2date_7404_released.html"
        },
        {
          "name": "DSA-1898",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1898"
        },
        {
          "name": "ADV-2009-1829",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1829"
        },
        {
          "name": "FEDORA-2009-7478",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html"
        },
        {
          "name": "35698",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35698"
        },
        {
          "name": "ADV-2009-3354",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3354"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://download.strongswan.org/CHANGES4.txt"
        },
        {
          "name": "FEDORA-2009-7423",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html"
        },
        {
          "name": "35804",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35804"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2185",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2009-1639",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1639"
            },
            {
              "name": "35740",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35740"
            },
            {
              "name": "http://www.ingate.com/Relnote.php?ver=481",
              "refsource": "CONFIRM",
              "url": "http://www.ingate.com/Relnote.php?ver=481"
            },
            {
              "name": "1022428",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022428"
            },
            {
              "name": "RHSA-2009:1138",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2009-1138.html"
            },
            {
              "name": "ADV-2009-1706",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1706"
            },
            {
              "name": "oval:org.mitre.oval:def:11079",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079"
            },
            {
              "name": "36950",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36950"
            },
            {
              "name": "35522",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35522"
            },
            {
              "name": "36922",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36922"
            },
            {
              "name": "37504",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37504"
            },
            {
              "name": "DSA-1899",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1899"
            },
            {
              "name": "35452",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35452"
            },
            {
              "name": "http://download.strongswan.org/CHANGES42.txt",
              "refsource": "CONFIRM",
              "url": "http://download.strongswan.org/CHANGES42.txt"
            },
            {
              "name": "http://download.strongswan.org/CHANGES2.txt",
              "refsource": "CONFIRM",
              "url": "http://download.strongswan.org/CHANGES2.txt"
            },
            {
              "name": "http://up2date.astaro.com/2009/07/up2date_7404_released.html",
              "refsource": "CONFIRM",
              "url": "http://up2date.astaro.com/2009/07/up2date_7404_released.html"
            },
            {
              "name": "DSA-1898",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1898"
            },
            {
              "name": "ADV-2009-1829",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1829"
            },
            {
              "name": "FEDORA-2009-7478",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html"
            },
            {
              "name": "35698",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35698"
            },
            {
              "name": "ADV-2009-3354",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3354"
            },
            {
              "name": "http://download.strongswan.org/CHANGES4.txt",
              "refsource": "CONFIRM",
              "url": "http://download.strongswan.org/CHANGES4.txt"
            },
            {
              "name": "FEDORA-2009-7423",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html"
            },
            {
              "name": "35804",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35804"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2185",
    "datePublished": "2009-06-24T23:00:00",
    "dateReserved": "2009-06-24T00:00:00",
    "dateUpdated": "2024-08-07T05:44:55.585Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-3380 (GCVE-0-2011-3380)
Vulnerability from cvelistv5
Published
2011-11-17 19:00
Modified
2024-08-06 23:29
Severity ?
CWE
  • n/a
Summary
Openswan 2.6.29 through 2.6.35 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto IKE daemon crash) via an ISAKMP message with an invalid KEY_LENGTH attribute, which is not properly handled by the error handling function.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:29:56.695Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/download/CVE-2011-3380/CVE-2011-3380.txt"
          },
          {
            "name": "46306",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46306"
          },
          {
            "name": "RHSA-2011:1356",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-1356.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-10-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Openswan 2.6.29 through 2.6.35 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto IKE daemon crash) via an ISAKMP message with an invalid KEY_LENGTH attribute, which is not properly handled by the error handling function."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-11-24T10:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/download/CVE-2011-3380/CVE-2011-3380.txt"
        },
        {
          "name": "46306",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46306"
        },
        {
          "name": "RHSA-2011:1356",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-1356.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-3380",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Openswan 2.6.29 through 2.6.35 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto IKE daemon crash) via an ISAKMP message with an invalid KEY_LENGTH attribute, which is not properly handled by the error handling function."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.openswan.org/download/CVE-2011-3380/CVE-2011-3380.txt",
              "refsource": "CONFIRM",
              "url": "http://www.openswan.org/download/CVE-2011-3380/CVE-2011-3380.txt"
            },
            {
              "name": "46306",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/46306"
            },
            {
              "name": "RHSA-2011:1356",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-1356.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-3380",
    "datePublished": "2011-11-17T19:00:00",
    "dateReserved": "2011-08-30T00:00:00",
    "dateUpdated": "2024-08-06T23:29:56.695Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0790 (GCVE-0-2009-0790)
Vulnerability from cvelistv5
Published
2009-04-01 10:00
Modified
2024-08-07 04:48
Severity ?
CWE
  • n/a
Summary
The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/49523 vdb-entry, x_refsource_XF
http://secunia.com/advisories/34494 third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171 vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/34472 third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1759 vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2009/0886 vdb-entry, x_refsource_VUPEN
http://www.securitytracker.com/id?1021949 vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/34546 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/502270/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/34483 third-party-advisory, x_refsource_SECUNIA
http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt x_refsource_CONFIRM
http://www.securitytracker.com/id?1021950 vdb-entry, x_refsource_SECTRACK
http://download.strongswan.org/CHANGES4.txt x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html vendor-advisory, x_refsource_SUSE
http://www.redhat.com/support/errata/RHSA-2009-0402.html vendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2009/dsa-1760 vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/34296 vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:48:52.007Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openswan-strongswan-dpd-dos(49523)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49523"
          },
          {
            "name": "34494",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34494"
          },
          {
            "name": "oval:org.mitre.oval:def:11171",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171"
          },
          {
            "name": "34472",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34472"
          },
          {
            "name": "DSA-1759",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1759"
          },
          {
            "name": "ADV-2009-0886",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0886"
          },
          {
            "name": "1021949",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021949"
          },
          {
            "name": "34546",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34546"
          },
          {
            "name": "20090330 CVE-2009-0790: ISAKMP DPD Remote Vulnerability with Openswan \u0026 Strongswan IPsec",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/502270/100/0/threaded"
          },
          {
            "name": "34483",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34483"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt"
          },
          {
            "name": "1021950",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021950"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://download.strongswan.org/CHANGES4.txt"
          },
          {
            "name": "SUSE-SR:2009:009",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html"
          },
          {
            "name": "RHSA-2009:0402",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html"
          },
          {
            "name": "DSA-1760",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1760"
          },
          {
            "name": "34296",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34296"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "openswan-strongswan-dpd-dos(49523)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49523"
        },
        {
          "name": "34494",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34494"
        },
        {
          "name": "oval:org.mitre.oval:def:11171",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171"
        },
        {
          "name": "34472",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34472"
        },
        {
          "name": "DSA-1759",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1759"
        },
        {
          "name": "ADV-2009-0886",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0886"
        },
        {
          "name": "1021949",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021949"
        },
        {
          "name": "34546",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34546"
        },
        {
          "name": "20090330 CVE-2009-0790: ISAKMP DPD Remote Vulnerability with Openswan \u0026 Strongswan IPsec",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/502270/100/0/threaded"
        },
        {
          "name": "34483",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34483"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt"
        },
        {
          "name": "1021950",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021950"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://download.strongswan.org/CHANGES4.txt"
        },
        {
          "name": "SUSE-SR:2009:009",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html"
        },
        {
          "name": "RHSA-2009:0402",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html"
        },
        {
          "name": "DSA-1760",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1760"
        },
        {
          "name": "34296",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34296"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-0790",
    "datePublished": "2009-04-01T10:00:00",
    "dateReserved": "2009-03-04T00:00:00",
    "dateUpdated": "2024-08-07T04:48:52.007Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-15836 (GCVE-0-2018-15836)
Vulnerability from cvelistv5
Published
2018-09-26 21:00
Modified
2024-08-05 10:01
Severity ?
CWE
  • n/a
Summary
In verify_signed_hash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used. IKEv2 signature verification is affected when RAW RSA keys are used.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T10:01:54.675Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[openswan-users] 20180824 Xelerance has released Openswan 2.6.50.1",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.openswan.org/pipermail/users/2018-August/023761.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-08-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In verify_signed_hash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used. IKEv2 signature verification is affected when RAW RSA keys are used."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-09-28T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[openswan-users] 20180824 Xelerance has released Openswan 2.6.50.1",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.openswan.org/pipermail/users/2018-August/023761.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-15836",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In verify_signed_hash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used. IKEv2 signature verification is affected when RAW RSA keys are used."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[openswan-users] 20180824 Xelerance has released Openswan 2.6.50.1",
              "refsource": "MLIST",
              "url": "https://lists.openswan.org/pipermail/users/2018-August/023761.html"
            },
            {
              "name": "https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d",
              "refsource": "CONFIRM",
              "url": "https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d"
            },
            {
              "name": "https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51",
              "refsource": "CONFIRM",
              "url": "https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-15836",
    "datePublished": "2018-09-26T21:00:00",
    "dateReserved": "2018-08-23T00:00:00",
    "dateUpdated": "2024-08-05T10:01:54.675Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2037 (GCVE-0-2014-2037)
Vulnerability from cvelistv5
Published
2014-11-26 15:00
Modified
2024-08-06 09:58
Severity ?
CWE
  • n/a
Summary
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:16.183Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20140217  Re: CVE request for unfixed CVE-2013-6466 in openswan-2.6.40",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2014/02/18/1"
          },
          {
            "name": "[Openswan Users] 20140221 Openswan 2.6.41 released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.openswan.org/pipermail/users/2014-February/022898.html"
          },
          {
            "name": "[oss-security] 20140220  Re: CVE request for unfixed CVE-2013-6466 in openswan-2.6.40",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2014/02/20/2"
          },
          {
            "name": "65629",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65629"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-02-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.  NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-11-26T13:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20140217  Re: CVE request for unfixed CVE-2013-6466 in openswan-2.6.40",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2014/02/18/1"
        },
        {
          "name": "[Openswan Users] 20140221 Openswan 2.6.41 released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.openswan.org/pipermail/users/2014-February/022898.html"
        },
        {
          "name": "[oss-security] 20140220  Re: CVE request for unfixed CVE-2013-6466 in openswan-2.6.40",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2014/02/20/2"
        },
        {
          "name": "65629",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65629"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-2037",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.  NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20140217  Re: CVE request for unfixed CVE-2013-6466 in openswan-2.6.40",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2014/02/18/1"
            },
            {
              "name": "[Openswan Users] 20140221 Openswan 2.6.41 released",
              "refsource": "MLIST",
              "url": "https://lists.openswan.org/pipermail/users/2014-February/022898.html"
            },
            {
              "name": "[oss-security] 20140220  Re: CVE request for unfixed CVE-2013-6466 in openswan-2.6.40",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2014/02/20/2"
            },
            {
              "name": "65629",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/65629"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-2037",
    "datePublished": "2014-11-26T15:00:00",
    "dateReserved": "2014-02-19T00:00:00",
    "dateUpdated": "2024-08-06T09:58:16.183Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2013-07-09 17:55
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "556AEC9E-9100-4946-8A73-269513CF7AAB",
              "versionEndIncluding": "2.6.38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FC55F9-B802-4843-8590-B24BE51CEABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DE9DD89-B625-47B1-A7C8-0E2B934C2F55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "78325087-599F-448B-8C47-570914FF6C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "059CFA5C-B262-47AF-94A6-8E74AFB19204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F25627-235B-4312-80A4-4E36DE0E72A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E70B88-6348-42BB-AE96-46BDB1F3C6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A9DF25-48E8-4D52-A267-1BE0437E9000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "C986533F-E320-46FA-A9F7-DAFDB1A0628A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C77DED4-2696-4172-92B7-43034E61F845",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "BED1BA7D-B603-49D4-9080-4A9FEC056A69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "207B98DB-5962-4F62-AF5B-D48EF0C0E2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB65639-AE3A-4984-93F9-2A8100DCEE6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8921D08-FBA3-4C0A-8944-362909C5EB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBD5312-E44F-4996-AA29-AFED53A90E8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1B24C96-47DF-4FA2-8DF4-8241F4964F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5067B83-AB9E-4819-B5A2-B14A96EB54C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "773B9BB2-0F65-4604-AF2C-8AC396DDC094",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA892169-0079-48D9-AEF5-641748CE1BF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7E9A23-65D9-4C3D-BF2D-007D3428DE2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "C41815E9-08BC-49ED-9016-5FE804DCC779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA99146-7368-44B6-B7B4-3D77741E5A7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0EF3852-4889-49F0-8D56-1E1FF1E811D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "D734AD8D-AE91-47C7-BD4D-467CFB63D163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAFF39D-126F-4984-A40B-88E94C680141",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EE725B-C26E-4343-B5F2-F5DF31A197C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "A26D9508-E43D-4BA2-9734-CDABBD405D26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D11526-6DCD-4B73-BACC-FC619D92BBB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "24641D2D-BB95-4E26-AD96-8CE96B6B3976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24A87F0-AE9A-46DB-8E47-7819E18513CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "13460979-98A3-4873-B9E4-86327F9C2B2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB91B1E2-12F5-4DE1-95D8-400196730902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F3F3F1A-8EA5-4065-84F8-3DBC5E4A8F1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records.  NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de buffer en la funci\u00f3n atodn en Openswan anteriores a v2.6.39, cuando est\u00e1 activada Opportunistic Encryptiony se usa una clave RSA, permite a los atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio IKE)y posiblemente ejecutar c\u00f3digo a trav\u00e9s de registros DNS TXT. Nota: esta podr\u00eda ser la misma vulnerabilidad que  CVE-2013-2052 y CVE-2013-2054."
    }
  ],
  "id": "CVE-2013-2053",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-07-09T17:55:01.030",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0827.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2014/dsa-2893"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/59838"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960229"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.openswan.org/news/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0827.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2893"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/59838"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960229"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.openswan.org/news/13"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-09-24 11:42
Modified
2025-04-09 00:30
Severity ?
Summary
The IPSEC livetest tool in Openswan 2.4.12 and earlier, and 2.6.x through 2.6.16, allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack on the (1) ipseclive.conn and (2) ipsec.olts.remote.log temporary files. NOTE: in many distributions and the upstream version, this tool has been disabled.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374Patch
cve@mitre.orghttp://dev.gentoo.org/~rbu/security/debiantemp/openswan
cve@mitre.orghttp://secunia.com/advisories/34182Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/34472Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1760Patch
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/10/30/2
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2009-0402.htmlPatch
cve@mitre.orghttp://www.securityfocus.com/archive/1/501624/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/501640/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/31243Patch
cve@mitre.orghttps://bugs.gentoo.org/show_bug.cgi?id=235770
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=460425
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/45250
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10078
cve@mitre.orghttps://www.exploit-db.com/exploits/9135
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374Patch
af854a3a-2127-422b-91ae-364da2661108http://dev.gentoo.org/~rbu/security/debiantemp/openswan
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34182Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34472Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1760Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/10/30/2
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-0402.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/501624/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/501640/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31243Patch
af854a3a-2127-422b-91ae-364da2661108https://bugs.gentoo.org/show_bug.cgi?id=235770
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=460425
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/45250
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10078
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/9135



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openswan:openswan:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "83BD9C38-8D11-4A21-9A80-83D4D02ECC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BF7EA37-F5B2-4EBE-A959-29F559A47F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C062450-8D41-4E0C-AEAD-6C51D9B8F107",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D15B299-2298-4617-8CED-5F98C2E68D07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FA0C68-A45A-42EB-9F1F-E911F32589BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "411E9D06-5756-4918-965C-3E83890F0316",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A9EABDE-514F-42BA-A335-135209605981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2425AF51-C42B-4EAA-A619-EE47EAFCBA83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "892D939B-4649-4B90-A2C0-6C2E4DDF7DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A321B57-5E08-48C8-9288-A92342770FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:2.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "54780B50-9CFE-43B6-8BB9-C7246F817773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "001E2700-CE33-495A-8F8A-81E2E550CFF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A628FE6-A042-4DF9-A141-8BE65FD236C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "112D7B10-50E4-4903-9E34-DB4857D6C658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7841F42-1226-43C4-A007-88847925D872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "77930F86-13FF-4787-A39F-2D00110AFBFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1ADD64-2503-4EED-9F6F-E425A3406123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3067BE9-4314-42BD-8131-89C4899F7D47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00CA6E5-1F63-4D59-BA72-0F8697671718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35A2049-8502-41F2-894E-E39AEBEB6816",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1109A84D-1815-4A7B-8EDA-E493A1973224",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20531A3-F6F8-4FE1-9C0A-FDFABAC4C6AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F212AE-D5B3-4A88-A1E6-00A13A0A2AD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD82E956-8C8E-4B38-9E82-4AA9AEFE6891",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0F0EA4-A0DF-48CC-9B42-465A36945503",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8945D2A7-B1C3-4981-B840-FB046AB6F4B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "338E969E-2CC6-44F3-A938-EE7131375AB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "78325087-599F-448B-8C47-570914FF6C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "059CFA5C-B262-47AF-94A6-8E74AFB19204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F25627-235B-4312-80A4-4E36DE0E72A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E70B88-6348-42BB-AE96-46BDB1F3C6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A9DF25-48E8-4D52-A267-1BE0437E9000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "C986533F-E320-46FA-A9F7-DAFDB1A0628A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C77DED4-2696-4172-92B7-43034E61F845",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "BED1BA7D-B603-49D4-9080-4A9FEC056A69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "207B98DB-5962-4F62-AF5B-D48EF0C0E2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB65639-AE3A-4984-93F9-2A8100DCEE6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8921D08-FBA3-4C0A-8944-362909C5EB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBD5312-E44F-4996-AA29-AFED53A90E8E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IPSEC livetest tool in Openswan 2.4.12 and earlier, and 2.6.x through 2.6.16, allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack on the (1) ipseclive.conn and (2) ipsec.olts.remote.log temporary files.  NOTE: in many distributions and the upstream version, this tool has been disabled."
    },
    {
      "lang": "es",
      "value": "La herramienta livetest de IPSEC en Openswan versi\u00f3n 2.4.12 y anteriores, y versiones 2.6.x hasta 2.6.16, permite a los usuarios locales sobrescribir archivos arbitrarios y ejecutar c\u00f3digo arbitrario mediante un ataque de tipo symlink en los archivos temporales (1) ipseclive.conn y (2) ipsec.olts.remote.log. NOTA: en muchas distribuciones y en la versi\u00f3n anterior, esta herramienta se ha deshabilitado."
    }
  ],
  "id": "CVE-2008-4190",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-09-24T11:42:25.250",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.gentoo.org/~rbu/security/debiantemp/openswan"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34182"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34472"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1760"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/501624/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/501640/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/31243"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460425"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45250"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10078"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/9135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.gentoo.org/~rbu/security/debiantemp/openswan"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34182"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34472"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1760"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/501624/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/501640/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/31243"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460425"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10078"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/9135"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "This issue has been addressed via: https://rhn.redhat.com/errata/RHSA-2009-0402.html",
      "lastModified": "2009-03-30T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-10-05 22:00
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html
secalert@redhat.comhttp://secunia.com/advisories/41769
secalert@redhat.comhttp://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txtVendor Advisory
secalert@redhat.comhttp://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patchPatch
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0892.html
secalert@redhat.comhttp://www.securityfocus.com/bid/43588
secalert@redhat.comhttp://www.securitytracker.com/id?1024749
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/2526Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/41769
af854a3a-2127-422b-91ae-364da2661108http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0892.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/43588
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1024749
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/2526Vendor Advisory
Impacted products
Vendor Product Version
xelerance openswan 2.6.26
xelerance openswan 2.6.27
xelerance openswan 2.6.28



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en programs/pluto/xauth.c en el cliente en Openswan v2.6.26 a v2.6.28 podr\u00eda permitir ejecutar c\u00f3digo de su elecci\u00f3n a gateways autenticados remotos o causar una denegaci\u00f3n de servicio a trav\u00e9s de valor excesivamente largo en cisco_banner  (tambi\u00e9n conocido como server_banner)."
    }
  ],
  "id": "CVE-2010-3308",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-10-05T22:00:05.927",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/41769"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/43588"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1024749"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2526"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/41769"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/43588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1024749"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2526"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-11-17 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions.
Impacted products
Vendor Product Version
xelerance openswan 2.3.0
xelerance openswan 2.3.1
xelerance openswan 2.4.0
xelerance openswan 2.4.1
xelerance openswan 2.4.2
xelerance openswan 2.4.3
xelerance openswan 2.4.4
xelerance openswan 2.4.5
xelerance openswan 2.4.6
xelerance openswan 2.4.7
xelerance openswan 2.4.8
xelerance openswan 2.4.9
xelerance openswan 2.4.10
xelerance openswan 2.4.11
xelerance openswan 2.4.12
xelerance openswan 2.4.13
xelerance openswan 2.5.0
xelerance openswan 2.5.0
xelerance openswan 2.5.0
xelerance openswan 2.5.01
xelerance openswan 2.5.02
xelerance openswan 2.5.03
xelerance openswan 2.5.04
xelerance openswan 2.5.05
xelerance openswan 2.5.06
xelerance openswan 2.5.07
xelerance openswan 2.5.08
xelerance openswan 2.5.09
xelerance openswan 2.5.10
xelerance openswan 2.5.11
xelerance openswan 2.5.12
xelerance openswan 2.5.13
xelerance openswan 2.5.14
xelerance openswan 2.5.15
xelerance openswan 2.5.16
xelerance openswan 2.5.17
xelerance openswan 2.5.18
xelerance openswan 2.6.01
xelerance openswan 2.6.02
xelerance openswan 2.6.03
xelerance openswan 2.6.04
xelerance openswan 2.6.05
xelerance openswan 2.6.06
xelerance openswan 2.6.07
xelerance openswan 2.6.08
xelerance openswan 2.6.09
xelerance openswan 2.6.10
xelerance openswan 2.6.11
xelerance openswan 2.6.12
xelerance openswan 2.6.13
xelerance openswan 2.6.14
xelerance openswan 2.6.15
xelerance openswan 2.6.16
xelerance openswan 2.6.17
xelerance openswan 2.6.18
xelerance openswan 2.6.19
xelerance openswan 2.6.20
xelerance openswan 2.6.21
xelerance openswan 2.6.22
xelerance openswan 2.6.23
xelerance openswan 2.6.24
xelerance openswan 2.6.25
xelerance openswan 2.6.26
xelerance openswan 2.6.27
xelerance openswan 2.6.28
xelerance openswan 2.6.29
xelerance openswan 2.6.30
xelerance openswan 2.6.31
xelerance openswan 2.6.32
xelerance openswan 2.6.33
xelerance openswan 2.6.34
xelerance openswan 2.6.35
xelerance openswan 2.6.36



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "39C5F91B-EE8A-4A81-A21D-68A3F4295200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "112D7B10-50E4-4903-9E34-DB4857D6C658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7841F42-1226-43C4-A007-88847925D872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "77930F86-13FF-4787-A39F-2D00110AFBFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1ADD64-2503-4EED-9F6F-E425A3406123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3067BE9-4314-42BD-8131-89C4899F7D47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00CA6E5-1F63-4D59-BA72-0F8697671718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35A2049-8502-41F2-894E-E39AEBEB6816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1109A84D-1815-4A7B-8EDA-E493A1973224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20531A3-F6F8-4FE1-9C0A-FDFABAC4C6AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F212AE-D5B3-4A88-A1E6-00A13A0A2AD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD82E956-8C8E-4B38-9E82-4AA9AEFE6891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0F0EA4-A0DF-48CC-9B42-465A36945503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8945D2A7-B1C3-4981-B840-FB046AB6F4B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "338E969E-2CC6-44F3-A938-EE7131375AB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0F3C93D-0575-4BAF-955A-C74D0C141523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DEFAF6E-FFEF-46A3-99C1-F95ACBDB78F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*",
              "matchCriteriaId": "8350D73B-8E0F-4A47-BAF0-8760DAB15FE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*",
              "matchCriteriaId": "4BB58EA0-D9DB-4E15-9A15-E36340AC8336",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "C97FA4D4-3804-4171-AF3F-3417438B3991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BE96833-5A92-4DFD-952D-DA9E89EBFD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A8774D7-E8B3-487F-BB2F-26819D43B9B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB7BA36B-D16C-424F-AB2B-F2377C27EEC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EBF6E8F-345B-464E-AF42-2023ADAD24AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE8382-1C52-497B-9CF7-FBE1F62FF393",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "14846867-EC43-4643-A746-E6FF74A257E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "06D3BE33-7C68-4B69-84CA-DEC5C9EEA1D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E28D36-D8F1-4801-AAC8-822A983EC8FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E818F98-46A4-46F0-9150-1BC2AFAA9AC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "657A6290-B56C-480A-B333-E80116CEB22E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3064E8F-D635-4EA3-A2CA-83F38CABFDD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBDB2792-C463-4E0A-BE7A-BDE5BE63EDEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C403BE3B-DEA3-4B14-907E-2801101465F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D9CF872-EF59-4686-BF3C-A35AAB987E76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "069A54BF-45EE-4C42-BBB7-7488F0FFB78F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBC5D566-407A-4F38-9E04-37AADFD6E5DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A80BD0-685C-4C7A-AD32-BF8763A4DBFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FC55F9-B802-4843-8590-B24BE51CEABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DE9DD89-B625-47B1-A7C8-0E2B934C2F55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "78325087-599F-448B-8C47-570914FF6C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "059CFA5C-B262-47AF-94A6-8E74AFB19204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F25627-235B-4312-80A4-4E36DE0E72A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E70B88-6348-42BB-AE96-46BDB1F3C6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A9DF25-48E8-4D52-A267-1BE0437E9000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "C986533F-E320-46FA-A9F7-DAFDB1A0628A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C77DED4-2696-4172-92B7-43034E61F845",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "BED1BA7D-B603-49D4-9080-4A9FEC056A69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "207B98DB-5962-4F62-AF5B-D48EF0C0E2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB65639-AE3A-4984-93F9-2A8100DCEE6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8921D08-FBA3-4C0A-8944-362909C5EB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBD5312-E44F-4996-AA29-AFED53A90E8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1B24C96-47DF-4FA2-8DF4-8241F4964F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5067B83-AB9E-4819-B5A2-B14A96EB54C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "773B9BB2-0F65-4604-AF2C-8AC396DDC094",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA892169-0079-48D9-AEF5-641748CE1BF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7E9A23-65D9-4C3D-BF2D-007D3428DE2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "C41815E9-08BC-49ED-9016-5FE804DCC779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA99146-7368-44B6-B7B4-3D77741E5A7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0EF3852-4889-49F0-8D56-1E1FF1E811D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "D734AD8D-AE91-47C7-BD4D-467CFB63D163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAFF39D-126F-4984-A40B-88E94C680141",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EE725B-C26E-4343-B5F2-F5DF31A197C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "A26D9508-E43D-4BA2-9734-CDABBD405D26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D11526-6DCD-4B73-BACC-FC619D92BBB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "24641D2D-BB95-4E26-AD96-8CE96B6B3976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24A87F0-AE9A-46DB-8E47-7819E18513CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "13460979-98A3-4873-B9E4-86327F9C2B2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB91B1E2-12F5-4DE1-95D8-400196730902",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de uso de memoria previamente liberada en la funcionalidad del manejador auxiliar criptogr\u00e1fico en Openswan versi\u00f3n 2.3.0 hasta 2.6.36, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio pluto IKE) por medio de vectores relacionados con las funciones (1) quick_outI1_continue y (2) quick_outI1."
    }
  ],
  "id": "CVE-2011-4073",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-11-17T19:55:01.390",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46678"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46681"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47342"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2374"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1422.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/50440"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1026268"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46678"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47342"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2374"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1422.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/50440"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1026268"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-06-25 02:00
Modified
2025-04-09 00:30
Severity ?
Summary
The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string.
References
cve@mitre.orghttp://download.strongswan.org/CHANGES2.txtVendor Advisory
cve@mitre.orghttp://download.strongswan.org/CHANGES4.txtVendor Advisory
cve@mitre.orghttp://download.strongswan.org/CHANGES42.txtVendor Advisory
cve@mitre.orghttp://secunia.com/advisories/35522Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/35698
cve@mitre.orghttp://secunia.com/advisories/35740
cve@mitre.orghttp://secunia.com/advisories/35804
cve@mitre.orghttp://secunia.com/advisories/36922
cve@mitre.orghttp://secunia.com/advisories/36950
cve@mitre.orghttp://secunia.com/advisories/37504
cve@mitre.orghttp://up2date.astaro.com/2009/07/up2date_7404_released.html
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1898
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1899
cve@mitre.orghttp://www.ingate.com/Relnote.php?ver=481
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2009-1138.html
cve@mitre.orghttp://www.securityfocus.com/bid/35452Patch
cve@mitre.orghttp://www.securitytracker.com/id?1022428
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1639Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1706
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1829
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/3354
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html
af854a3a-2127-422b-91ae-364da2661108http://download.strongswan.org/CHANGES2.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://download.strongswan.org/CHANGES4.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://download.strongswan.org/CHANGES42.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35522Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35698
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35740
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35804
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36922
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36950
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37504
af854a3a-2127-422b-91ae-364da2661108http://up2date.astaro.com/2009/07/up2date_7404_released.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1898
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1899
af854a3a-2127-422b-91ae-364da2661108http://www.ingate.com/Relnote.php?ver=481
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-1138.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/35452Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022428
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1639Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1706
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1829
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3354
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html
Impacted products
Vendor Product Version
strongswan strongswan 2.8.0
strongswan strongswan 2.8.1
strongswan strongswan 2.8.2
strongswan strongswan 2.8.3
strongswan strongswan 2.8.4
strongswan strongswan 2.8.5
strongswan strongswan 2.8.6
strongswan strongswan 2.8.7
strongswan strongswan 2.8.8
strongswan strongswan 2.8.9
strongswan strongswan 2.8.10
strongswan strongswan 4.1
strongswan strongswan 4.2.0
strongswan strongswan 4.2.1
strongswan strongswan 4.2.2
strongswan strongswan 4.2.3
strongswan strongswan 4.2.4
strongswan strongswan 4.2.5
strongswan strongswan 4.2.6
strongswan strongswan 4.2.7
strongswan strongswan 4.2.8
strongswan strongswan 4.2.9
strongswan strongswan 4.2.10
strongswan strongswan 4.2.11
strongswan strongswan 4.2.12
strongswan strongswan 4.2.13
strongswan strongswan 4.2.14
strongswan strongswan 4.2.15
strongswan strongswan 4.3.0
strongswan strongswan 4.3.1
xelerance openswan 2.4.0
xelerance openswan 2.4.1
xelerance openswan 2.4.2
xelerance openswan 2.4.3
xelerance openswan 2.4.4
xelerance openswan 2.4.5
xelerance openswan 2.4.9
xelerance openswan 2.4.10
xelerance openswan 2.6.03
xelerance openswan 2.6.04
xelerance openswan 2.6.05
xelerance openswan 2.6.06
xelerance openswan 2.6.07
xelerance openswan 2.6.08
xelerance openswan 2.6.09
xelerance openswan 2.6.10
xelerance openswan 2.6.11
xelerance openswan 2.6.12
xelerance openswan 2.6.13
xelerance openswan 2.6.14
xelerance openswan 2.6.15
xelerance openswan 2.6.16
xelerance openswan 2.6.17
xelerance openswan 2.6.18
xelerance openswan 2.6.19
xelerance openswan 2.6.20



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5518A917-D5D1-4985-BF71-B1A34BD3D5B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "778D7442-F54A-47DF-B87B-3CFA3CF08799",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A4B1F28-B3B8-4E31-8E4E-25F5A29F3AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "16984E6E-7CA8-4DC3-B800-FFE007617FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C85F0BE-7E89-4B79-A036-9238785BE705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DFF4780-2F92-4DF3-878A-C7E2BD57E39C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C794994-9367-4BBB-8940-BBB44B7C1C5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "082272D3-0FE4-4959-978A-FFF795B52CA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DFEF9B3-C7F7-4588-A174-FAFD39C04116",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "02A38BCE-66F9-49F9-8C48-DB3DA9E7054D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18EB62-1042-4F26-9EC3-B7EEA2182716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89C6007-3A8D-427D-8BE3-047DD52DE196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "97027262-849C-4DE9-90C9-0D9FBBC9F96B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8658539D-27D8-47EE-9468-A6B625E6D45F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ACA351-D10F-4D1A-95B0-4B2E329F1E1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A4D6E89-5313-4016-8A7E-036579330DB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "95A8E226-FCEC-4545-A628-24F5A8103BCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B944D80-A8B9-4034-A95B-BA92ADC8D4E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5267BCC-A51C-4F3B-840C-49EF9C2A15F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CDCDB4B-2DF5-4394-B33A-08A4B6604D92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "66206A52-373C-4DBB-A3D7-2A7569C0181E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F654D3C4-D3A3-41E1-A0D8-3A384319AE08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C41F9E10-000D-4F3B-BEA6-DEE87405B89B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F37DFE8-2996-4904-B733-7BAECA95CB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "38209DC9-3BE6-49EF-8BA1-6E2BC5D24FEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "155EB8F5-7C3C-4293-91EE-62DA561DA54A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "E42B67A3-8650-426F-A8E8-DCA4180D787A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "21CDA326-C5E4-4BAF-9DC6-4E5A57304C1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "384C0CAE-8AC3-47AA-9F1C-9DE6779CA583",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "00BC4DA6-BFD1-43CF-B8B8-DACBF09E4721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7841F42-1226-43C4-A007-88847925D872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "77930F86-13FF-4787-A39F-2D00110AFBFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1ADD64-2503-4EED-9F6F-E425A3406123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3067BE9-4314-42BD-8131-89C4899F7D47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00CA6E5-1F63-4D59-BA72-0F8697671718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35A2049-8502-41F2-894E-E39AEBEB6816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD82E956-8C8E-4B38-9E82-4AA9AEFE6891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0F0EA4-A0DF-48CC-9B42-465A36945503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "78325087-599F-448B-8C47-570914FF6C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "059CFA5C-B262-47AF-94A6-8E74AFB19204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F25627-235B-4312-80A4-4E36DE0E72A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E70B88-6348-42BB-AE96-46BDB1F3C6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A9DF25-48E8-4D52-A267-1BE0437E9000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "C986533F-E320-46FA-A9F7-DAFDB1A0628A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C77DED4-2696-4172-92B7-43034E61F845",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "BED1BA7D-B603-49D4-9080-4A9FEC056A69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "207B98DB-5962-4F62-AF5B-D48EF0C0E2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB65639-AE3A-4984-93F9-2A8100DCEE6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8921D08-FBA3-4C0A-8944-362909C5EB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBD5312-E44F-4996-AA29-AFED53A90E8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1B24C96-47DF-4FA2-8DF4-8241F4964F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5067B83-AB9E-4819-B5A2-B14A96EB54C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "773B9BB2-0F65-4604-AF2C-8AC396DDC094",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA892169-0079-48D9-AEF5-641748CE1BF2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string."
    },
    {
      "lang": "es",
      "value": "El analizador ASN.1 pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) en (a) strongSwan v2.8 anterior a v2.8.10, v4.2 anterior a v4.2.16, y v4.3 anterior a v4.3.2; y  (b) openSwan v2.6 anterior a v2.6.22 y v2.4 anterior a v2.4.15 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio IKE pluto) a trav\u00e9s de un certificado X.509 con (1) Nombres Caracterizados Relativos (RDNs) (2) una cadena UTCTIME manipulada, o (3) una cadena GENERALIZEDTIME manipulada."
    }
  ],
  "id": "CVE-2009-2185",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-06-25T02:00:00.297",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://download.strongswan.org/CHANGES2.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://download.strongswan.org/CHANGES4.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://download.strongswan.org/CHANGES42.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35522"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/35698"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/35740"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/35804"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/36922"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/36950"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/37504"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://up2date.astaro.com/2009/07/up2date_7404_released.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1898"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1899"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ingate.com/Relnote.php?ver=481"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1138.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/35452"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1022428"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1639"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2009/1706"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2009/1829"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2009/3354"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://download.strongswan.org/CHANGES2.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://download.strongswan.org/CHANGES4.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://download.strongswan.org/CHANGES42.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35522"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35698"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35740"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35804"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36922"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/37504"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://up2date.astaro.com/2009/07/up2date_7404_released.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1898"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1899"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ingate.com/Relnote.php?ver=481"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1138.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/35452"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1022428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1639"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/1706"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/1829"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/3354"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-09-26 21:29
Modified
2024-11-21 03:51
Summary
In verify_signed_hash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used. IKEv2 signature verification is affected when RAW RSA keys are used.
Impacted products
Vendor Product Version
xelerance openswan *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32D061AF-9BDF-481D-859E-5700E186FA15",
              "versionEndExcluding": "2.6.50.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In verify_signed_hash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used. IKEv2 signature verification is affected when RAW RSA keys are used."
    },
    {
      "lang": "es",
      "value": "En Openswan en versiones anteriores a la 2.6.50.1, la verificaci\u00f3n de firmas IKEv2 es vulnerable a \"variantes de ataques de bajo exponente de Bleichenbacher en firmas RSA PKCS#1\" cuando se emplean claves RSA RAW."
    }
  ],
  "id": "CVE-2018-15836",
  "lastModified": "2024-11-21T03:51:32.187",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-09-26T21:29:00.913",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://lists.openswan.org/pipermail/users/2018-August/023761.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://lists.openswan.org/pipermail/users/2018-August/023761.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-347"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-11-18 21:03
Modified
2025-04-03 01:03
Severity ?
Summary
The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html
cve@mitre.orghttp://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html
cve@mitre.orghttp://jvn.jp/niscc/NISCC-273756/index.html
cve@mitre.orghttp://secunia.com/advisories/17581
cve@mitre.orghttp://secunia.com/advisories/17680
cve@mitre.orghttp://secunia.com/advisories/17980
cve@mitre.orghttp://secunia.com/advisories/18115
cve@mitre.orghttp://securitytracker.com/id?1015214
cve@mitre.orghttp://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/Exploit
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200512-04.xml
cve@mitre.orghttp://www.kb.cert.org/vuls/id/226364Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=enVendor Advisory
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_70_ipsec.html
cve@mitre.orghttp://www.openswan.org/niscc2/Patch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html
cve@mitre.orghttp://www.securityfocus.com/bid/15416Patch
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html
af854a3a-2127-422b-91ae-364da2661108http://jvn.jp/niscc/NISCC-273756/index.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17581
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17680
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17980
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18115
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015214
af854a3a-2127-422b-91ae-364da2661108http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/226364Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=enVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_70_ipsec.html
af854a3a-2127-422b-91ae-364da2661108http://www.openswan.org/niscc2/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15416Patch
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:frees_wan:frees_wan:2.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "68C84C1F-2804-4E5F-B34E-D75530CD5A71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A9EABDE-514F-42BA-A335-135209605981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2425AF51-C42B-4EAA-A619-EE47EAFCBA83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "892D939B-4649-4B90-A2C0-6C2E4DDF7DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A321B57-5E08-48C8-9288-A92342770FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:2.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "54780B50-9CFE-43B6-8BB9-C7246F817773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "001E2700-CE33-495A-8F8A-81E2E550CFF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openswan:openswan:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A628FE6-A042-4DF9-A141-8BE65FD236C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7841F42-1226-43C4-A007-88847925D872",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1."
    }
  ],
  "id": "CVE-2005-3671",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-11-18T21:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/niscc/NISCC-273756/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17581"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17680"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17980"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18115"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015214"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/226364"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2005_70_ipsec.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.openswan.org/niscc2/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/15416"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/niscc/NISCC-273756/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17581"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17680"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17980"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/226364"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2005_70_ipsec.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.openswan.org/niscc2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/15416"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-10-05 22:00
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a packet.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html
secalert@redhat.comhttp://secunia.com/advisories/41769
secalert@redhat.comhttp://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txtVendor Advisory
secalert@redhat.comhttp://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patchPatch
secalert@redhat.comhttp://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patchPatch
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0892.html
secalert@redhat.comhttp://www.securityfocus.com/bid/43588
secalert@redhat.comhttp://www.securitytracker.com/id?1024749
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/2526Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/41769
af854a3a-2127-422b-91ae-364da2661108http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0892.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/43588
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1024749
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/2526Vendor Advisory
Impacted products
Vendor Product Version
xelerance openswan 2.6.25
xelerance openswan 2.6.26
xelerance openswan 2.6.27
xelerance openswan 2.6.28



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "D734AD8D-AE91-47C7-BD4D-467CFB63D163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a packet."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en programs/pluto/xauth.c en el cliente en Openswan v2.6.25 a v2.6.28 podr\u00eda permitir ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de puertas de enlace remoto autenticadas o causar una denegaci\u00f3n de servicio a trav\u00e9s de datos demasiado largos en los campos (1) cisco_dns_info o (2) cisco_domain_info."
    }
  ],
  "id": "CVE-2010-3302",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-10-05T22:00:05.410",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/41769"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/43588"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1024749"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2526"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/41769"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/43588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1024749"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2526"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-04-01 10:30
Modified
2025-04-09 00:30
Severity ?
Summary
The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD.
References
secalert@redhat.comhttp://download.strongswan.org/CHANGES4.txtVendor Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
secalert@redhat.comhttp://secunia.com/advisories/34472Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/34483Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/34494Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/34546Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2009/dsa-1759Patch
secalert@redhat.comhttp://www.debian.org/security/2009/dsa-1760Patch
secalert@redhat.comhttp://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txtVendor Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2009-0402.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/502270/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/34296Patch
secalert@redhat.comhttp://www.securitytracker.com/id?1021949
secalert@redhat.comhttp://www.securitytracker.com/id?1021950
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/0886
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/49523
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171
af854a3a-2127-422b-91ae-364da2661108http://download.strongswan.org/CHANGES4.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34472Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34483Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34494Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34546Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1759Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1760Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-0402.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/502270/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34296Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021949
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021950
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0886
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49523
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171
Impacted products
Vendor Product Version
strongswan strongswan 2.4.0
strongswan strongswan 2.4.0a
strongswan strongswan 2.4.1
strongswan strongswan 2.4.2
strongswan strongswan 2.4.3
strongswan strongswan 2.4.4
strongswan strongswan 2.6.0
strongswan strongswan 2.6.1
strongswan strongswan 2.6.2
strongswan strongswan 2.6.3
strongswan strongswan 2.6.4
strongswan strongswan 2.8.0
strongswan strongswan 2.8.1
strongswan strongswan 2.8.2
strongswan strongswan 2.8.3
strongswan strongswan 2.8.4
strongswan strongswan 2.8.5
strongswan strongswan 2.8.6
strongswan strongswan 2.8.7
strongswan strongswan 2.8.8
strongswan strongswan 4.2.0
strongswan strongswan 4.2.1
strongswan strongswan 4.2.2
strongswan strongswan 4.2.3
strongswan strongswan 4.2.4
strongswan strongswan 4.2.5
strongswan strongswan 4.2.6
strongswan strongswan 4.2.7
strongswan strongswan 4.2.8
strongswan strongswan 4.2.9
strongswan strongswan 4.2.10
strongswan strongswan 4.2.11
strongswan strongswan 4.2.12
strongswan strongswan 4.2.13
xelerance openswan 2.4.0
xelerance openswan 2.4.1
xelerance openswan 2.4.2
xelerance openswan 2.4.3
xelerance openswan 2.4.4
xelerance openswan 2.4.5
xelerance openswan 2.4.9
xelerance openswan 2.4.10
xelerance openswan 2.6.03
xelerance openswan 2.6.04
xelerance openswan 2.6.05
xelerance openswan 2.6.06
xelerance openswan 2.6.07
xelerance openswan 2.6.08
xelerance openswan 2.6.09
xelerance openswan 2.6.10
xelerance openswan 2.6.11
xelerance openswan 2.6.12
xelerance openswan 2.6.13
xelerance openswan 2.6.14
xelerance openswan 2.6.15
xelerance openswan 2.6.16
xelerance openswan 2.6.17
xelerance openswan 2.6.18
xelerance openswan 2.6.19
xelerance openswan 2.6.20



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "339E325D-B76C-400C-B332-7CA675C4F72B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.4.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "F90373CD-E5C7-46BE-8C5F-22D3DE12A3E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B8C12F9-A14F-4BC5-A2CC-18DADE8454C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E4DAD-B255-4666-927F-D82AC7396FE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B602806-1420-4640-AD17-A2FEFDA6A967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A203ADA7-54C9-4F37-A254-0A5378BB9B1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D09EEB6-386C-4A73-BC08-4243BDC49EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBE3B5F4-063F-4AE9-B589-932751182101",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AFD8D5D-7FB7-4B25-B1F2-7850348A6924",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F75943-1327-4868-88D5-917D06BCF5E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4BE9083-EF34-4B1A-A139-E779E9704F88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5518A917-D5D1-4985-BF71-B1A34BD3D5B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "778D7442-F54A-47DF-B87B-3CFA3CF08799",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A4B1F28-B3B8-4E31-8E4E-25F5A29F3AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "16984E6E-7CA8-4DC3-B800-FFE007617FE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C85F0BE-7E89-4B79-A036-9238785BE705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DFF4780-2F92-4DF3-878A-C7E2BD57E39C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C794994-9367-4BBB-8940-BBB44B7C1C5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "082272D3-0FE4-4959-978A-FFF795B52CA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DFEF9B3-C7F7-4588-A174-FAFD39C04116",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "97027262-849C-4DE9-90C9-0D9FBBC9F96B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8658539D-27D8-47EE-9468-A6B625E6D45F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ACA351-D10F-4D1A-95B0-4B2E329F1E1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A4D6E89-5313-4016-8A7E-036579330DB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "95A8E226-FCEC-4545-A628-24F5A8103BCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B944D80-A8B9-4034-A95B-BA92ADC8D4E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5267BCC-A51C-4F3B-840C-49EF9C2A15F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CDCDB4B-2DF5-4394-B33A-08A4B6604D92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "66206A52-373C-4DBB-A3D7-2A7569C0181E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F654D3C4-D3A3-41E1-A0D8-3A384319AE08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C41F9E10-000D-4F3B-BEA6-DEE87405B89B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F37DFE8-2996-4904-B733-7BAECA95CB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "38209DC9-3BE6-49EF-8BA1-6E2BC5D24FEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "155EB8F5-7C3C-4293-91EE-62DA561DA54A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7841F42-1226-43C4-A007-88847925D872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "77930F86-13FF-4787-A39F-2D00110AFBFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1ADD64-2503-4EED-9F6F-E425A3406123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3067BE9-4314-42BD-8131-89C4899F7D47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00CA6E5-1F63-4D59-BA72-0F8697671718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35A2049-8502-41F2-894E-E39AEBEB6816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD82E956-8C8E-4B38-9E82-4AA9AEFE6891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0F0EA4-A0DF-48CC-9B42-465A36945503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "78325087-599F-448B-8C47-570914FF6C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "059CFA5C-B262-47AF-94A6-8E74AFB19204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F25627-235B-4312-80A4-4E36DE0E72A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E70B88-6348-42BB-AE96-46BDB1F3C6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A9DF25-48E8-4D52-A267-1BE0437E9000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "C986533F-E320-46FA-A9F7-DAFDB1A0628A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C77DED4-2696-4172-92B7-43034E61F845",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "BED1BA7D-B603-49D4-9080-4A9FEC056A69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "207B98DB-5962-4F62-AF5B-D48EF0C0E2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB65639-AE3A-4984-93F9-2A8100DCEE6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8921D08-FBA3-4C0A-8944-362909C5EB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBD5312-E44F-4996-AA29-AFED53A90E8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1B24C96-47DF-4FA2-8DF4-8241F4964F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5067B83-AB9E-4819-B5A2-B14A96EB54C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "773B9BB2-0F65-4604-AF2C-8AC396DDC094",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA892169-0079-48D9-AEF5-641748CE1BF2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD."
    },
    {
      "lang": "es",
      "value": "El demonio IKE pluto de Openswan y Strongswan IPsec v2.6 anterior a v2.6.21 y v2.4 anterior a v2.4.14, y Strongswan v4.2 anterior a v4.2.14 y v2.8 anteior a v2.8.9; permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio y reinicio) a trav\u00e9s de (1) R_U_THERE o (2) R_U_THERE_ACK  Detecci\u00f3n de pares muertos (Dead Peer Detection -DPD)  mensaje de Notificaci\u00f3n IKE IPsec que provoca una referencia a puntero nulo relacionado con el estado inconsistente ISAKMP y la falta de un estado de asociacion phase2 en DPD."
    }
  ],
  "id": "CVE-2009-0790",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-04-01T10:30:00.267",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://download.strongswan.org/CHANGES4.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34472"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34483"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34494"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34546"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1759"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1760"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/502270/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/34296"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1021949"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1021950"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2009/0886"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49523"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://download.strongswan.org/CHANGES4.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34472"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34483"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34494"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34546"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1759"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1760"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/502270/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/34296"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1021949"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1021950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/0886"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49523"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-10-05 22:00
Modified
2025-04-11 00:51
Severity ?
Summary
programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.
Impacted products
Vendor Product Version
xelerance openswan 2.6.26
xelerance openswan 2.6.27
xelerance openswan 2.6.28



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308."
    },
    {
      "lang": "es",
      "value": "programs/pluto/xauth.c en el cliente en Openswan v2.6.26 a v2.6.28 permite ejecutar, a gateways autenticados remotos, comandos de su elecci\u00f3n a trav\u00e9s de metacaracteres encubiertos en el campo cisco_banner (tambi\u00e9n conocido como server_banner). Se trata de una vulnerabilidad diferente a CVE-2010-3308."
    }
  ],
  "id": "CVE-2010-3753",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-10-05T22:00:06.020",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/43588"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1024749"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2526"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/43588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1024749"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2526"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-01-26 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.
Impacted products
Vendor Product Version
openswan openswan *
xelerance openswan 2.3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openswan:openswan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2411B8B-FE2A-4E99-A280-0FB39291E96F",
              "versionEndIncluding": "1.0.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "39C5F91B-EE8A-4A81-A21D-68A3F4295200",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code."
    }
  ],
  "id": "CVE-2005-0162",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-01-26T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/14038"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/14062"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1013014"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=190\u0026type=vulnerabilities"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.openswan.org/support/vuln/IDEF0785/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/13195"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/12377"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19078"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/14038"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/14062"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1013014"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=190\u0026type=vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.openswan.org/support/vuln/IDEF0785/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/13195"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/12377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19078"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-06-12 14:29
Modified
2024-11-21 04:18
Summary
The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "03762F60-C5B0-4D4C-95E1-9D6BDA7A2C0B",
              "versionEndExcluding": "3.29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "489C88AB-FD16-4BBD-9915-906B88F9A9E5",
              "versionEndExcluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06958DB5-E8C3-4446-B3CF-D1D7B58B4CE9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
              "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado una vulnerabilidad en el proyecto The Libreswan en el procesador de IKEv1 Los paquetes de intercambio informativo IKEv1 que est\u00e1n cifrados y protegidos por integridad utilizando las claves de integridad y cifrado IKE SA establecidas, pero como receptor, el valor de verificaci\u00f3n de integridad no se verific\u00f3. Este problema afecta a las versiones anteriores a 3.29."
    }
  ],
  "id": "CVE-2019-10155",
  "lastModified": "2024-11-21T04:18:32.000",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 3.1,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 1.4,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 3.1,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-06-12T14:29:02.917",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2019:3391"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://libreswan.org/security/CVE-2019-10155/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUEXFCN7FAYBKJBQJLYCEUQUCHDEJRZW/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LFGPGLLKAXSLWFI62A6BZHTZSCHRCBXS/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2019:3391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://libreswan.org/security/CVE-2019-10155/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUEXFCN7FAYBKJBQJLYCEUQUCHDEJRZW/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LFGPGLLKAXSLWFI62A6BZHTZSCHRCBXS/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-354"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-354"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-11-26 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.
Impacted products
Vendor Product Version
xelerance openswan 2.6.40



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4E7464-19DE-428C-93B7-283377156C54",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.  NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466."
    },
    {
      "lang": "es",
      "value": "Openswan 2.6.40 permite a atacantes remotos causar una denegaci\u00f3n de servicio (referencia a puntero nulo y reinicio del demonio IKE) a trav\u00e9s de paquetes IKEv2 que no llevan las cargas esperadas. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta para CVE 2013-6466."
    }
  ],
  "id": "CVE-2014-2037",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-11-26T15:59:00.090",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2014/02/18/1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2014/02/20/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/65629"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://lists.openswan.org/pipermail/users/2014-February/022898.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2014/02/18/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2014/02/20/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/65629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://lists.openswan.org/pipermail/users/2014-February/022898.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-10-05 22:00
Modified
2025-04-11 00:51
Severity ?
Summary
programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerability than CVE-2010-3302.
Impacted products
Vendor Product Version
xelerance openswan 2.6.25
xelerance openswan 2.6.26
xelerance openswan 2.6.27
xelerance openswan 2.6.28



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "D734AD8D-AE91-47C7-BD4D-467CFB63D163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerability than CVE-2010-3302."
    },
    {
      "lang": "es",
      "value": "programs/pluto/xauth.c en el cliente en Openswan v2.6.26 a v2.6.28 permite ejecutar, a gateways autenticados remotos, comandos de su elecci\u00f3n a trav\u00e9s de metacaracteres encubiertos en el campo cisco_banner (tambi\u00e9n conocido como server_banner). Se trata de una vulnerabilidad diferente a CVE-2010-3308."
    }
  ],
  "id": "CVE-2010-3752",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-10-05T22:00:05.973",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/43588"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1024749"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2526"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/43588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1024749"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2526"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-11-17 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
Openswan 2.6.29 through 2.6.35 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto IKE daemon crash) via an ISAKMP message with an invalid KEY_LENGTH attribute, which is not properly handled by the error handling function.
Impacted products
Vendor Product Version
xelerance openswan 2.6.29
xelerance openswan 2.6.30
xelerance openswan 2.6.31
xelerance openswan 2.6.32
xelerance openswan 2.6.33
xelerance openswan 2.6.34
xelerance openswan 2.6.35



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAFF39D-126F-4984-A40B-88E94C680141",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EE725B-C26E-4343-B5F2-F5DF31A197C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "A26D9508-E43D-4BA2-9734-CDABBD405D26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D11526-6DCD-4B73-BACC-FC619D92BBB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "24641D2D-BB95-4E26-AD96-8CE96B6B3976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24A87F0-AE9A-46DB-8E47-7819E18513CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "13460979-98A3-4873-B9E4-86327F9C2B2A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Openswan 2.6.29 through 2.6.35 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto IKE daemon crash) via an ISAKMP message with an invalid KEY_LENGTH attribute, which is not properly handled by the error handling function."
    },
    {
      "lang": "es",
      "value": "Openswan v2.6.29 a trav\u00e9s de v2.6.35 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (puntero a NULL y Plut\u00f3n accidente demonio IKE) a trav\u00e9s de un mensaje ISAKMP con un atributo no v\u00e1lido key_length, que no se gestiona adecuadamente por la funci\u00f3n de control de errores."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n\u0027CWE-476: NULL Pointer Dereference\u0027",
  "id": "CVE-2011-3380",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-11-17T19:55:01.127",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/46306"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openswan.org/download/CVE-2011-3380/CVE-2011-3380.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1356.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/46306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openswan.org/download/CVE-2011-3380/CVE-2011-3380.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1356.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-01-26 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.
Impacted products
Vendor Product Version
xelerance openswan *
xelerance openswan 2.3.0
xelerance openswan 2.3.1
xelerance openswan 2.4.0
xelerance openswan 2.4.1
xelerance openswan 2.4.2
xelerance openswan 2.4.3
xelerance openswan 2.4.4
xelerance openswan 2.4.5
xelerance openswan 2.4.6
xelerance openswan 2.4.7
xelerance openswan 2.4.8
xelerance openswan 2.4.9
xelerance openswan 2.4.10
xelerance openswan 2.4.11
xelerance openswan 2.4.12
xelerance openswan 2.4.13
xelerance openswan 2.5.0
xelerance openswan 2.5.0
xelerance openswan 2.5.0
xelerance openswan 2.5.01
xelerance openswan 2.5.02
xelerance openswan 2.5.03
xelerance openswan 2.5.04
xelerance openswan 2.5.05
xelerance openswan 2.5.06
xelerance openswan 2.5.07
xelerance openswan 2.5.08
xelerance openswan 2.5.09
xelerance openswan 2.5.10
xelerance openswan 2.5.11
xelerance openswan 2.5.12
xelerance openswan 2.5.13
xelerance openswan 2.5.14
xelerance openswan 2.5.15
xelerance openswan 2.5.16
xelerance openswan 2.5.17
xelerance openswan 2.5.18
xelerance openswan 2.6.01
xelerance openswan 2.6.02
xelerance openswan 2.6.03
xelerance openswan 2.6.04
xelerance openswan 2.6.05
xelerance openswan 2.6.06
xelerance openswan 2.6.07
xelerance openswan 2.6.08
xelerance openswan 2.6.09
xelerance openswan 2.6.10
xelerance openswan 2.6.11
xelerance openswan 2.6.12
xelerance openswan 2.6.13
xelerance openswan 2.6.14
xelerance openswan 2.6.15
xelerance openswan 2.6.16
xelerance openswan 2.6.17
xelerance openswan 2.6.18
xelerance openswan 2.6.19
xelerance openswan 2.6.20
xelerance openswan 2.6.21
xelerance openswan 2.6.22
xelerance openswan 2.6.23
xelerance openswan 2.6.24
xelerance openswan 2.6.25
xelerance openswan 2.6.26
xelerance openswan 2.6.27
xelerance openswan 2.6.28
xelerance openswan 2.6.29
xelerance openswan 2.6.30
xelerance openswan 2.6.31
xelerance openswan 2.6.32
xelerance openswan 2.6.33
xelerance openswan 2.6.34
xelerance openswan 2.6.35
xelerance openswan 2.6.36
xelerance openswan 2.6.37
xelerance openswan 2.6.38



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0383946F-A466-43FD-81D5-5B0E4BDBB969",
              "versionEndIncluding": "2.6.39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "39C5F91B-EE8A-4A81-A21D-68A3F4295200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "112D7B10-50E4-4903-9E34-DB4857D6C658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7841F42-1226-43C4-A007-88847925D872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "77930F86-13FF-4787-A39F-2D00110AFBFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1ADD64-2503-4EED-9F6F-E425A3406123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3067BE9-4314-42BD-8131-89C4899F7D47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00CA6E5-1F63-4D59-BA72-0F8697671718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35A2049-8502-41F2-894E-E39AEBEB6816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1109A84D-1815-4A7B-8EDA-E493A1973224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20531A3-F6F8-4FE1-9C0A-FDFABAC4C6AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F212AE-D5B3-4A88-A1E6-00A13A0A2AD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD82E956-8C8E-4B38-9E82-4AA9AEFE6891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0F0EA4-A0DF-48CC-9B42-465A36945503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8945D2A7-B1C3-4981-B840-FB046AB6F4B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "338E969E-2CC6-44F3-A938-EE7131375AB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0F3C93D-0575-4BAF-955A-C74D0C141523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DEFAF6E-FFEF-46A3-99C1-F95ACBDB78F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*",
              "matchCriteriaId": "8350D73B-8E0F-4A47-BAF0-8760DAB15FE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*",
              "matchCriteriaId": "4BB58EA0-D9DB-4E15-9A15-E36340AC8336",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "C97FA4D4-3804-4171-AF3F-3417438B3991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BE96833-5A92-4DFD-952D-DA9E89EBFD4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A8774D7-E8B3-487F-BB2F-26819D43B9B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB7BA36B-D16C-424F-AB2B-F2377C27EEC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EBF6E8F-345B-464E-AF42-2023ADAD24AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE8382-1C52-497B-9CF7-FBE1F62FF393",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "14846867-EC43-4643-A746-E6FF74A257E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "06D3BE33-7C68-4B69-84CA-DEC5C9EEA1D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E28D36-D8F1-4801-AAC8-822A983EC8FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E818F98-46A4-46F0-9150-1BC2AFAA9AC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "657A6290-B56C-480A-B333-E80116CEB22E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3064E8F-D635-4EA3-A2CA-83F38CABFDD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBDB2792-C463-4E0A-BE7A-BDE5BE63EDEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C403BE3B-DEA3-4B14-907E-2801101465F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D9CF872-EF59-4686-BF3C-A35AAB987E76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "069A54BF-45EE-4C42-BBB7-7488F0FFB78F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBC5D566-407A-4F38-9E04-37AADFD6E5DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A80BD0-685C-4C7A-AD32-BF8763A4DBFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FC55F9-B802-4843-8590-B24BE51CEABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DE9DD89-B625-47B1-A7C8-0E2B934C2F55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "78325087-599F-448B-8C47-570914FF6C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "059CFA5C-B262-47AF-94A6-8E74AFB19204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F25627-235B-4312-80A4-4E36DE0E72A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E70B88-6348-42BB-AE96-46BDB1F3C6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A9DF25-48E8-4D52-A267-1BE0437E9000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "C986533F-E320-46FA-A9F7-DAFDB1A0628A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C77DED4-2696-4172-92B7-43034E61F845",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "BED1BA7D-B603-49D4-9080-4A9FEC056A69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "207B98DB-5962-4F62-AF5B-D48EF0C0E2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB65639-AE3A-4984-93F9-2A8100DCEE6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8921D08-FBA3-4C0A-8944-362909C5EB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBD5312-E44F-4996-AA29-AFED53A90E8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1B24C96-47DF-4FA2-8DF4-8241F4964F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5067B83-AB9E-4819-B5A2-B14A96EB54C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "773B9BB2-0F65-4604-AF2C-8AC396DDC094",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA892169-0079-48D9-AEF5-641748CE1BF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7E9A23-65D9-4C3D-BF2D-007D3428DE2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "C41815E9-08BC-49ED-9016-5FE804DCC779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA99146-7368-44B6-B7B4-3D77741E5A7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0EF3852-4889-49F0-8D56-1E1FF1E811D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "D734AD8D-AE91-47C7-BD4D-467CFB63D163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAFF39D-126F-4984-A40B-88E94C680141",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "73EE725B-C26E-4343-B5F2-F5DF31A197C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "A26D9508-E43D-4BA2-9734-CDABBD405D26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D11526-6DCD-4B73-BACC-FC619D92BBB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "24641D2D-BB95-4E26-AD96-8CE96B6B3976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24A87F0-AE9A-46DB-8E47-7819E18513CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "13460979-98A3-4873-B9E4-86327F9C2B2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB91B1E2-12F5-4DE1-95D8-400196730902",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F3F3F1A-8EA5-4065-84F8-3DBC5E4A8F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xelerance:openswan:2.6.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "3662B940-BE1F-4CB5-B341-2E3DE8954064",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads."
    },
    {
      "lang": "es",
      "value": "Openswan v2.6.39 y anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero nulo y reinicio del demonio IKE) a trav\u00e9s de paquetes IKEv2 que cuenten con payloads esperados."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\n\n\"CWE-476: NULL Pointer Dereference\"",
  "id": "CVE-2013-6466",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-01-26T20:55:05.330",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2014/dsa-2893"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/65155"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://cert.vde.com/en-us/advisories/vde-2017-001"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2893"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/65155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://cert.vde.com/en-us/advisories/vde-2017-001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}