Page 2 of 6 results (0.002 seconds)

CVSS: 7.2EPSS: 2%CPEs: 2EXPL: 0

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code. • http://secunia.com/advisories/14038 http://secunia.com/advisories/14062 http://securitytracker.com/id?1013014 http://www.idefense.com/application/poi/display?id=190&type=vulnerabilities http://www.openswan.org/support/vuln/IDEF0785 http://www.osvdb.org/13195 http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html http://www.securityfocus.com/bid/12377 https://exchange.xforce.ibmcloud.com/vulnerabilities/19078 •