First published: Tue Oct 05 2010(Updated: )
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a packet.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openswan | =2.6.25 | |
Openswan | =2.6.26 | |
Openswan | =2.6.27 | |
Openswan | =2.6.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3302 has a high severity rating due to its potential to allow remote code execution.
Openswan versions 2.6.25 through 2.6.28 are affected by CVE-2010-3302.
To fix CVE-2010-3302, upgrade to a version of Openswan that is not vulnerable, such as version 2.6.29 or later.
CVE-2010-3302 is a buffer overflow vulnerability that can lead to arbitrary code execution.
Yes, CVE-2010-3302 can be exploited remotely by sending specially crafted packets to an affected Openswan installation.