First published: Tue Oct 05 2010(Updated: )
programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerability than CVE-2010-3302.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openswan | =2.6.25 | |
Openswan | =2.6.26 | |
Openswan | =2.6.27 | |
Openswan | =2.6.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3752 is considered a high severity vulnerability due to its potential for remote command execution.
To fix CVE-2010-3752, upgrade OpenSWAN to a version higher than 2.6.28 where the vulnerability has been addressed.
CVE-2010-3752 affects OpenSWAN versions 2.6.25 through 2.6.28.
CVE-2010-3752 enables attackers to execute arbitrary commands on the vulnerable system via crafted packets.
Yes, CVE-2010-3752 requires the attacker to have a remote authenticated gateway to exploit the vulnerability.