Page 2 of 7 results (0.016 seconds)

CVSS: 7.8EPSS: 5%CPEs: 9EXPL: 1

The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. • http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html http://jvn.jp/niscc/NISCC-273756/index.html http://secunia.com/advisories/17581 http://secunia.com/advisories/17680 http://secunia.com/advisories/17980 http://secunia.com/advisories/18115 http://securitytracker.com/id?1015214 http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp http://www.gentoo.org/security/en/glsa/glsa-200512-04.x •

CVSS: 7.2EPSS: 2%CPEs: 2EXPL: 0

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code. • http://secunia.com/advisories/14038 http://secunia.com/advisories/14062 http://securitytracker.com/id?1013014 http://www.idefense.com/application/poi/display?id=190&type=vulnerabilities http://www.openswan.org/support/vuln/IDEF0785 http://www.osvdb.org/13195 http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html http://www.securityfocus.com/bid/12377 https://exchange.xforce.ibmcloud.com/vulnerabilities/19078 •