Page 2 of 6 results (0.003 seconds)

CVSS: 7.1EPSS: 2%CPEs: 4EXPL: 0

Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a packet. Desbordamiento de búfer en programs/pluto/xauth.c en el cliente en Openswan v2.6.25 a v2.6.28 podría permitir ejecutar código de su elección a través de puertas de enlace remoto autenticadas o causar una denegación de servicio a través de datos demasiado largos en los campos (1) cisco_dns_info o (2) cisco_domain_info. • http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html http://secunia.com/advisories/41769 http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26- • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •