First published: Tue Oct 05 2010(Updated: )
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openswan | =2.6.26 | |
Openswan | =2.6.27 | |
Openswan | =2.6.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3308 is rated as high severity due to the potential for remote code execution or denial of service.
To fix CVE-2010-3308, upgrade Openswan to a version later than 2.6.28 where the vulnerability is patched.
CVE-2010-3308 affects users of Openswan versions 2.6.26 through 2.6.28.
CVE-2010-3308 is a buffer overflow vulnerability related to the handling of long input in the cisco_banner field.
Yes, CVE-2010-3308 can allow attackers to execute arbitrary code, potentially leading to data compromise.