First published: Thu Nov 17 2011(Updated: )
Openswan 2.6.29 through 2.6.35 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto IKE daemon crash) via an ISAKMP message with an invalid KEY_LENGTH attribute, which is not properly handled by the error handling function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openswan | =2.6.29 | |
Openswan | =2.6.30 | |
Openswan | =2.6.31 | |
Openswan | =2.6.32 | |
Openswan | =2.6.33 | |
Openswan | =2.6.34 | |
Openswan | =2.6.35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3380 has been classified as a moderate severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2011-3380, update your Openswan installation to version 2.6.36 or later, which addresses the vulnerability.
CVE-2011-3380 affects Openswan versions 2.6.29 through 2.6.35.
CVE-2011-3380 involves a denial of service attack caused by a NULL pointer dereference due to an invalid KEY_LENGTH attribute.
Yes, CVE-2011-3380 can be exploited remotely by sending a specially crafted ISAKMP message.