First published: Wed Jan 26 2005(Updated: )
Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xelerance Openswan | <=1.0.9 | |
Openswan | =2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0162 is considered a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2005-0162, upgrade Openswan to version 1.0.9 or 2.3.0 or later.
CVE-2005-0162 affects Openswan 1.x before 1.0.9 and 2.x before 2.3.0 when compiled with XAUTH and PAM enabled.
No, an attacker must be an authenticated user to exploit CVE-2005-0162.
If exploited, CVE-2005-0162 allows remote authenticated attackers to execute arbitrary code on the affected system.