First published: Tue Oct 05 2010(Updated: )
programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openswan | =2.6.26 | |
Openswan | =2.6.27 | |
Openswan | =2.6.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3753 has a high severity as it allows remote authenticated gateways to execute arbitrary commands.
Fix CVE-2010-3753 by upgrading to Openswan version 2.6.29 or later where the vulnerability has been addressed.
Openswan versions 2.6.26, 2.6.27, and 2.6.28 are affected by CVE-2010-3753.
CVE-2010-3753 addresses a vulnerability that allows arbitrary command execution via shell metacharacters in the server_banner field.
Yes, CVE-2010-3753 is recognized as a security issue in specific versions of Openswan, identified in security advisories.