All the vulnerabilites related to xelerance - openswan
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51 | Patch, Vendor Advisory | |
cve@mitre.org | https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d | Patch, Vendor Advisory | |
cve@mitre.org | https://lists.openswan.org/pipermail/users/2018-August/023761.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.openswan.org/pipermail/users/2018-August/023761.html | Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*", "matchCriteriaId": "32D061AF-9BDF-481D-859E-5700E186FA15", "versionEndExcluding": "2.6.50.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In verify_signed_hash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used. IKEv2 signature verification is affected when RAW RSA keys are used." }, { "lang": "es", "value": "En Openswan en versiones anteriores a la 2.6.50.1, la verificaci\u00f3n de firmas IKEv2 es vulnerable a \"variantes de ataques de bajo exponente de Bleichenbacher en firmas RSA PKCS#1\" cuando se emplean claves RSA RAW." } ], "id": "CVE-2018-15836", "lastModified": "2024-11-21T03:51:32.187", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-26T21:29:00.913", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://lists.openswan.org/pipermail/users/2018-August/023761.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://lists.openswan.org/pipermail/users/2018-August/023761.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*", "matchCriteriaId": "556AEC9E-9100-4946-8A73-269513CF7AAB", "versionEndIncluding": "2.6.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*", "matchCriteriaId": "44FC55F9-B802-4843-8590-B24BE51CEABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*", "matchCriteriaId": "1DE9DD89-B625-47B1-A7C8-0E2B934C2F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*", "matchCriteriaId": "78325087-599F-448B-8C47-570914FF6C59", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*", "matchCriteriaId": "059CFA5C-B262-47AF-94A6-8E74AFB19204", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*", "matchCriteriaId": "12F25627-235B-4312-80A4-4E36DE0E72A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*", "matchCriteriaId": "B3E70B88-6348-42BB-AE96-46BDB1F3C6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*", "matchCriteriaId": "12A9DF25-48E8-4D52-A267-1BE0437E9000", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*", "matchCriteriaId": "C986533F-E320-46FA-A9F7-DAFDB1A0628A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*", "matchCriteriaId": "7C77DED4-2696-4172-92B7-43034E61F845", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "BED1BA7D-B603-49D4-9080-4A9FEC056A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "207B98DB-5962-4F62-AF5B-D48EF0C0E2A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "DFB65639-AE3A-4984-93F9-2A8100DCEE6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "B8921D08-FBA3-4C0A-8944-362909C5EB6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "3FBD5312-E44F-4996-AA29-AFED53A90E8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E1B24C96-47DF-4FA2-8DF4-8241F4964F5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "A5067B83-AB9E-4819-B5A2-B14A96EB54C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "773B9BB2-0F65-4604-AF2C-8AC396DDC094", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "AA892169-0079-48D9-AEF5-641748CE1BF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A7E9A23-65D9-4C3D-BF2D-007D3428DE2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "C41815E9-08BC-49ED-9016-5FE804DCC779", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "7FA99146-7368-44B6-B7B4-3D77741E5A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "A0EF3852-4889-49F0-8D56-1E1FF1E811D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "D734AD8D-AE91-47C7-BD4D-467CFB63D163", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*", "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*", "matchCriteriaId": "CFAFF39D-126F-4984-A40B-88E94C680141", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*", "matchCriteriaId": "73EE725B-C26E-4343-B5F2-F5DF31A197C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*", "matchCriteriaId": "A26D9508-E43D-4BA2-9734-CDABBD405D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*", "matchCriteriaId": "01D11526-6DCD-4B73-BACC-FC619D92BBB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*", "matchCriteriaId": "24641D2D-BB95-4E26-AD96-8CE96B6B3976", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*", "matchCriteriaId": "A24A87F0-AE9A-46DB-8E47-7819E18513CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*", "matchCriteriaId": "13460979-98A3-4873-B9E4-86327F9C2B2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*", "matchCriteriaId": "DB91B1E2-12F5-4DE1-95D8-400196730902", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*", "matchCriteriaId": "3F3F3F1A-8EA5-4065-84F8-3DBC5E4A8F1F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054." }, { "lang": "es", "value": "Desbordamiento de buffer en la funci\u00f3n atodn en Openswan anteriores a v2.6.39, cuando est\u00e1 activada Opportunistic Encryptiony se usa una clave RSA, permite a los atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio IKE)y posiblemente ejecutar c\u00f3digo a trav\u00e9s de registros DNS TXT. Nota: esta podr\u00eda ser la misma vulnerabilidad que CVE-2013-2052 y CVE-2013-2054." } ], "id": "CVE-2013-2053", "lastModified": "2024-11-21T01:50:56.423", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-09T17:55:01.030", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0827.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2014/dsa-2893" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/59838" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960229" }, { "source": "secalert@redhat.com", "url": "https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://www.openswan.org/news/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0827.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2893" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/59838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960229" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.openswan.org/news/13" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
libreswan | libreswan | * | |
strongswan | strongswan | * | |
xelerance | openswan | * | |
fedoraproject | fedora | 29 | |
fedoraproject | fedora | 30 | |
redhat | enterprise_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:*", "matchCriteriaId": "03762F60-C5B0-4D4C-95E1-9D6BDA7A2C0B", "versionEndExcluding": "3.29", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*", "matchCriteriaId": "489C88AB-FD16-4BBD-9915-906B88F9A9E5", "versionEndExcluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*", "matchCriteriaId": "06958DB5-E8C3-4446-B3CF-D1D7B58B4CE9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29." }, { "lang": "es", "value": "Se ha encontrado una vulnerabilidad en el proyecto The Libreswan en el procesador de IKEv1 Los paquetes de intercambio informativo IKEv1 que est\u00e1n cifrados y protegidos por integridad utilizando las claves de integridad y cifrado IKE SA establecidas, pero como receptor, el valor de verificaci\u00f3n de integridad no se verific\u00f3. Este problema afecta a las versiones anteriores a 3.29." } ], "id": "CVE-2019-10155", "lastModified": "2024-11-21T04:18:32.000", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "secalert@redhat.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-12T14:29:02.917", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3391" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://libreswan.org/security/CVE-2019-10155/" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUEXFCN7FAYBKJBQJLYCEUQUCHDEJRZW/" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LFGPGLLKAXSLWFI62A6BZHTZSCHRCBXS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://libreswan.org/security/CVE-2019-10155/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUEXFCN7FAYBKJBQJLYCEUQUCHDEJRZW/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LFGPGLLKAXSLWFI62A6BZHTZSCHRCBXS/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-354" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-354" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frees_wan:frees_wan:2.04:*:*:*:*:*:*:*", "matchCriteriaId": "68C84C1F-2804-4E5F-B34E-D75530CD5A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A9EABDE-514F-42BA-A335-135209605981", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2425AF51-C42B-4EAA-A619-EE47EAFCBA83", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "892D939B-4649-4B90-A2C0-6C2E4DDF7DFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "1A321B57-5E08-48C8-9288-A92342770FD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "54780B50-9CFE-43B6-8BB9-C7246F817773", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "001E2700-CE33-495A-8F8A-81E2E550CFF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "6A628FE6-A042-4DF9-A141-8BE65FD236C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7841F42-1226-43C4-A007-88847925D872", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1." } ], "id": "CVE-2005-3671", "lastModified": "2024-11-21T00:02:24.197", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-11-18T21:03:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html" }, { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html" }, { "source": "cve@mitre.org", "url": "http://jvn.jp/niscc/NISCC-273756/index.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/17581" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/17680" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/17980" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/18115" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015214" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/226364" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2005_70_ipsec.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.openswan.org/niscc2/" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/15416" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/niscc/NISCC-273756/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/17581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/17680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/17980" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/226364" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2005_70_ipsec.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.openswan.org/niscc2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/15416" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*", "matchCriteriaId": "0383946F-A466-43FD-81D5-5B0E4BDBB969", "versionEndIncluding": "2.6.39", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "39C5F91B-EE8A-4A81-A21D-68A3F4295200", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "112D7B10-50E4-4903-9E34-DB4857D6C658", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7841F42-1226-43C4-A007-88847925D872", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "77930F86-13FF-4787-A39F-2D00110AFBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B1ADD64-2503-4EED-9F6F-E425A3406123", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3067BE9-4314-42BD-8131-89C4899F7D47", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "E00CA6E5-1F63-4D59-BA72-0F8697671718", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "C35A2049-8502-41F2-894E-E39AEBEB6816", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "1109A84D-1815-4A7B-8EDA-E493A1973224", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "B20531A3-F6F8-4FE1-9C0A-FDFABAC4C6AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9F212AE-D5B3-4A88-A1E6-00A13A0A2AD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "DD82E956-8C8E-4B38-9E82-4AA9AEFE6891", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "2D0F0EA4-A0DF-48CC-9B42-465A36945503", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "8945D2A7-B1C3-4981-B840-FB046AB6F4B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "338E969E-2CC6-44F3-A938-EE7131375AB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "A0F3C93D-0575-4BAF-955A-C74D0C141523", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7DEFAF6E-FFEF-46A3-99C1-F95ACBDB78F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*", "matchCriteriaId": "8350D73B-8E0F-4A47-BAF0-8760DAB15FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*", "matchCriteriaId": "4BB58EA0-D9DB-4E15-9A15-E36340AC8336", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*", "matchCriteriaId": "C97FA4D4-3804-4171-AF3F-3417438B3991", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*", "matchCriteriaId": "0BE96833-5A92-4DFD-952D-DA9E89EBFD4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*", "matchCriteriaId": "6A8774D7-E8B3-487F-BB2F-26819D43B9B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*", "matchCriteriaId": "AB7BA36B-D16C-424F-AB2B-F2377C27EEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*", "matchCriteriaId": "0EBF6E8F-345B-464E-AF42-2023ADAD24AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*", "matchCriteriaId": "01BE8382-1C52-497B-9CF7-FBE1F62FF393", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*", "matchCriteriaId": "14846867-EC43-4643-A746-E6FF74A257E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*", "matchCriteriaId": "06D3BE33-7C68-4B69-84CA-DEC5C9EEA1D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*", "matchCriteriaId": "45E28D36-D8F1-4801-AAC8-822A983EC8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "4E818F98-46A4-46F0-9150-1BC2AFAA9AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "657A6290-B56C-480A-B333-E80116CEB22E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "C3064E8F-D635-4EA3-A2CA-83F38CABFDD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "CBDB2792-C463-4E0A-BE7A-BDE5BE63EDEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "C403BE3B-DEA3-4B14-907E-2801101465F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "5D9CF872-EF59-4686-BF3C-A35AAB987E76", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "069A54BF-45EE-4C42-BBB7-7488F0FFB78F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "EBC5D566-407A-4F38-9E04-37AADFD6E5DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "08A80BD0-685C-4C7A-AD32-BF8763A4DBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*", "matchCriteriaId": "44FC55F9-B802-4843-8590-B24BE51CEABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*", "matchCriteriaId": "1DE9DD89-B625-47B1-A7C8-0E2B934C2F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*", "matchCriteriaId": "78325087-599F-448B-8C47-570914FF6C59", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*", "matchCriteriaId": "059CFA5C-B262-47AF-94A6-8E74AFB19204", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*", "matchCriteriaId": "12F25627-235B-4312-80A4-4E36DE0E72A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*", "matchCriteriaId": "B3E70B88-6348-42BB-AE96-46BDB1F3C6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*", "matchCriteriaId": "12A9DF25-48E8-4D52-A267-1BE0437E9000", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*", "matchCriteriaId": "C986533F-E320-46FA-A9F7-DAFDB1A0628A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*", "matchCriteriaId": "7C77DED4-2696-4172-92B7-43034E61F845", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "BED1BA7D-B603-49D4-9080-4A9FEC056A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "207B98DB-5962-4F62-AF5B-D48EF0C0E2A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "DFB65639-AE3A-4984-93F9-2A8100DCEE6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "B8921D08-FBA3-4C0A-8944-362909C5EB6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "3FBD5312-E44F-4996-AA29-AFED53A90E8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E1B24C96-47DF-4FA2-8DF4-8241F4964F5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "A5067B83-AB9E-4819-B5A2-B14A96EB54C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "773B9BB2-0F65-4604-AF2C-8AC396DDC094", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "AA892169-0079-48D9-AEF5-641748CE1BF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A7E9A23-65D9-4C3D-BF2D-007D3428DE2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "C41815E9-08BC-49ED-9016-5FE804DCC779", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "7FA99146-7368-44B6-B7B4-3D77741E5A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "A0EF3852-4889-49F0-8D56-1E1FF1E811D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "D734AD8D-AE91-47C7-BD4D-467CFB63D163", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*", "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*", "matchCriteriaId": "CFAFF39D-126F-4984-A40B-88E94C680141", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*", "matchCriteriaId": "73EE725B-C26E-4343-B5F2-F5DF31A197C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*", "matchCriteriaId": "A26D9508-E43D-4BA2-9734-CDABBD405D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*", "matchCriteriaId": "01D11526-6DCD-4B73-BACC-FC619D92BBB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*", "matchCriteriaId": "24641D2D-BB95-4E26-AD96-8CE96B6B3976", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*", "matchCriteriaId": "A24A87F0-AE9A-46DB-8E47-7819E18513CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*", "matchCriteriaId": "13460979-98A3-4873-B9E4-86327F9C2B2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*", "matchCriteriaId": "DB91B1E2-12F5-4DE1-95D8-400196730902", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*", "matchCriteriaId": "3F3F3F1A-8EA5-4065-84F8-3DBC5E4A8F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.38:*:*:*:*:*:*:*", "matchCriteriaId": "3662B940-BE1F-4CB5-B341-2E3DE8954064", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads." }, { "lang": "es", "value": "Openswan v2.6.39 y anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero nulo y reinicio del demonio IKE) a trav\u00e9s de paquetes IKEv2 que cuenten con payloads esperados." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\n\n\"CWE-476: NULL Pointer Dereference\"", "id": "CVE-2013-6466", "lastModified": "2024-11-21T01:59:17.140", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-01-26T20:55:05.330", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2014/dsa-2893" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/65155" }, { "source": "secalert@redhat.com", "url": "https://cert.vde.com/en-us/advisories/vde-2017-001" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2893" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert.vde.com/en-us/advisories/vde-2017-001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "39C5F91B-EE8A-4A81-A21D-68A3F4295200", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "112D7B10-50E4-4903-9E34-DB4857D6C658", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7841F42-1226-43C4-A007-88847925D872", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "77930F86-13FF-4787-A39F-2D00110AFBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B1ADD64-2503-4EED-9F6F-E425A3406123", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3067BE9-4314-42BD-8131-89C4899F7D47", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "E00CA6E5-1F63-4D59-BA72-0F8697671718", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "C35A2049-8502-41F2-894E-E39AEBEB6816", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "1109A84D-1815-4A7B-8EDA-E493A1973224", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "B20531A3-F6F8-4FE1-9C0A-FDFABAC4C6AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9F212AE-D5B3-4A88-A1E6-00A13A0A2AD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "DD82E956-8C8E-4B38-9E82-4AA9AEFE6891", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "2D0F0EA4-A0DF-48CC-9B42-465A36945503", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "8945D2A7-B1C3-4981-B840-FB046AB6F4B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "338E969E-2CC6-44F3-A938-EE7131375AB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "A0F3C93D-0575-4BAF-955A-C74D0C141523", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7DEFAF6E-FFEF-46A3-99C1-F95ACBDB78F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*", "matchCriteriaId": "8350D73B-8E0F-4A47-BAF0-8760DAB15FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*", "matchCriteriaId": "4BB58EA0-D9DB-4E15-9A15-E36340AC8336", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*", "matchCriteriaId": "C97FA4D4-3804-4171-AF3F-3417438B3991", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*", "matchCriteriaId": "0BE96833-5A92-4DFD-952D-DA9E89EBFD4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*", "matchCriteriaId": "6A8774D7-E8B3-487F-BB2F-26819D43B9B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*", "matchCriteriaId": "AB7BA36B-D16C-424F-AB2B-F2377C27EEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*", "matchCriteriaId": "0EBF6E8F-345B-464E-AF42-2023ADAD24AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*", "matchCriteriaId": "01BE8382-1C52-497B-9CF7-FBE1F62FF393", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*", "matchCriteriaId": "14846867-EC43-4643-A746-E6FF74A257E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*", "matchCriteriaId": "06D3BE33-7C68-4B69-84CA-DEC5C9EEA1D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*", "matchCriteriaId": "45E28D36-D8F1-4801-AAC8-822A983EC8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "4E818F98-46A4-46F0-9150-1BC2AFAA9AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "657A6290-B56C-480A-B333-E80116CEB22E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "C3064E8F-D635-4EA3-A2CA-83F38CABFDD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "CBDB2792-C463-4E0A-BE7A-BDE5BE63EDEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "C403BE3B-DEA3-4B14-907E-2801101465F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "5D9CF872-EF59-4686-BF3C-A35AAB987E76", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "069A54BF-45EE-4C42-BBB7-7488F0FFB78F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "EBC5D566-407A-4F38-9E04-37AADFD6E5DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "08A80BD0-685C-4C7A-AD32-BF8763A4DBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*", "matchCriteriaId": "44FC55F9-B802-4843-8590-B24BE51CEABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*", "matchCriteriaId": "1DE9DD89-B625-47B1-A7C8-0E2B934C2F55", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*", "matchCriteriaId": "78325087-599F-448B-8C47-570914FF6C59", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*", "matchCriteriaId": "059CFA5C-B262-47AF-94A6-8E74AFB19204", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*", "matchCriteriaId": "12F25627-235B-4312-80A4-4E36DE0E72A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*", "matchCriteriaId": "B3E70B88-6348-42BB-AE96-46BDB1F3C6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*", "matchCriteriaId": "12A9DF25-48E8-4D52-A267-1BE0437E9000", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*", "matchCriteriaId": "C986533F-E320-46FA-A9F7-DAFDB1A0628A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*", "matchCriteriaId": "7C77DED4-2696-4172-92B7-43034E61F845", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "BED1BA7D-B603-49D4-9080-4A9FEC056A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "207B98DB-5962-4F62-AF5B-D48EF0C0E2A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "DFB65639-AE3A-4984-93F9-2A8100DCEE6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "B8921D08-FBA3-4C0A-8944-362909C5EB6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "3FBD5312-E44F-4996-AA29-AFED53A90E8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E1B24C96-47DF-4FA2-8DF4-8241F4964F5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "A5067B83-AB9E-4819-B5A2-B14A96EB54C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "773B9BB2-0F65-4604-AF2C-8AC396DDC094", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "AA892169-0079-48D9-AEF5-641748CE1BF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A7E9A23-65D9-4C3D-BF2D-007D3428DE2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "C41815E9-08BC-49ED-9016-5FE804DCC779", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "7FA99146-7368-44B6-B7B4-3D77741E5A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "A0EF3852-4889-49F0-8D56-1E1FF1E811D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "D734AD8D-AE91-47C7-BD4D-467CFB63D163", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*", "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*", "matchCriteriaId": "CFAFF39D-126F-4984-A40B-88E94C680141", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*", "matchCriteriaId": "73EE725B-C26E-4343-B5F2-F5DF31A197C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*", "matchCriteriaId": "A26D9508-E43D-4BA2-9734-CDABBD405D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*", "matchCriteriaId": "01D11526-6DCD-4B73-BACC-FC619D92BBB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*", "matchCriteriaId": "24641D2D-BB95-4E26-AD96-8CE96B6B3976", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*", "matchCriteriaId": "A24A87F0-AE9A-46DB-8E47-7819E18513CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*", "matchCriteriaId": "13460979-98A3-4873-B9E4-86327F9C2B2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*", "matchCriteriaId": "DB91B1E2-12F5-4DE1-95D8-400196730902", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions." }, { "lang": "es", "value": "Una vulnerabilidad de uso de memoria previamente liberada en la funcionalidad del manejador auxiliar criptogr\u00e1fico en Openswan versi\u00f3n 2.3.0 hasta 2.6.36, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio pluto IKE) por medio de vectores relacionados con las funciones (1) quick_outI1_continue y (2) quick_outI1." } ], "id": "CVE-2011-4073", "lastModified": "2024-11-21T01:31:47.587", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-11-17T19:55:01.390", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/46678" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/46681" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47342" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2374" }, { "source": "cve@mitre.org", "url": "http://www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-1422.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/50440" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1026268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/46678" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/46681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47342" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2374" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-1422.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/50440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026268" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5518A917-D5D1-4985-BF71-B1A34BD3D5B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "778D7442-F54A-47DF-B87B-3CFA3CF08799", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "2A4B1F28-B3B8-4E31-8E4E-25F5A29F3AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16984E6E-7CA8-4DC3-B800-FFE007617FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "4C85F0BE-7E89-4B79-A036-9238785BE705", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "8DFF4780-2F92-4DF3-878A-C7E2BD57E39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "6C794994-9367-4BBB-8940-BBB44B7C1C5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "082272D3-0FE4-4959-978A-FFF795B52CA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "8DFEF9B3-C7F7-4588-A174-FAFD39C04116", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "02A38BCE-66F9-49F9-8C48-DB3DA9E7054D", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "8E18EB62-1042-4F26-9EC3-B7EEA2182716", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "C89C6007-3A8D-427D-8BE3-047DD52DE196", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "97027262-849C-4DE9-90C9-0D9FBBC9F96B", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8658539D-27D8-47EE-9468-A6B625E6D45F", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "89ACA351-D10F-4D1A-95B0-4B2E329F1E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7A4D6E89-5313-4016-8A7E-036579330DB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "95A8E226-FCEC-4545-A628-24F5A8103BCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "1B944D80-A8B9-4034-A95B-BA92ADC8D4E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "F5267BCC-A51C-4F3B-840C-49EF9C2A15F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8CDCDB4B-2DF5-4394-B33A-08A4B6604D92", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "66206A52-373C-4DBB-A3D7-2A7569C0181E", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F654D3C4-D3A3-41E1-A0D8-3A384319AE08", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "C41F9E10-000D-4F3B-BEA6-DEE87405B89B", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "4F37DFE8-2996-4904-B733-7BAECA95CB48", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "38209DC9-3BE6-49EF-8BA1-6E2BC5D24FEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "155EB8F5-7C3C-4293-91EE-62DA561DA54A", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "E42B67A3-8650-426F-A8E8-DCA4180D787A", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "21CDA326-C5E4-4BAF-9DC6-4E5A57304C1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "384C0CAE-8AC3-47AA-9F1C-9DE6779CA583", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "00BC4DA6-BFD1-43CF-B8B8-DACBF09E4721", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7841F42-1226-43C4-A007-88847925D872", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "77930F86-13FF-4787-A39F-2D00110AFBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B1ADD64-2503-4EED-9F6F-E425A3406123", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3067BE9-4314-42BD-8131-89C4899F7D47", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "E00CA6E5-1F63-4D59-BA72-0F8697671718", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "C35A2049-8502-41F2-894E-E39AEBEB6816", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "DD82E956-8C8E-4B38-9E82-4AA9AEFE6891", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "2D0F0EA4-A0DF-48CC-9B42-465A36945503", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*", "matchCriteriaId": "78325087-599F-448B-8C47-570914FF6C59", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*", "matchCriteriaId": "059CFA5C-B262-47AF-94A6-8E74AFB19204", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*", "matchCriteriaId": "12F25627-235B-4312-80A4-4E36DE0E72A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*", "matchCriteriaId": "B3E70B88-6348-42BB-AE96-46BDB1F3C6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*", "matchCriteriaId": "12A9DF25-48E8-4D52-A267-1BE0437E9000", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*", "matchCriteriaId": "C986533F-E320-46FA-A9F7-DAFDB1A0628A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*", "matchCriteriaId": "7C77DED4-2696-4172-92B7-43034E61F845", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "BED1BA7D-B603-49D4-9080-4A9FEC056A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "207B98DB-5962-4F62-AF5B-D48EF0C0E2A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "DFB65639-AE3A-4984-93F9-2A8100DCEE6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "B8921D08-FBA3-4C0A-8944-362909C5EB6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "3FBD5312-E44F-4996-AA29-AFED53A90E8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E1B24C96-47DF-4FA2-8DF4-8241F4964F5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "A5067B83-AB9E-4819-B5A2-B14A96EB54C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "773B9BB2-0F65-4604-AF2C-8AC396DDC094", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "AA892169-0079-48D9-AEF5-641748CE1BF2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string." }, { "lang": "es", "value": "El analizador ASN.1 pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) en (a) strongSwan v2.8 anterior a v2.8.10, v4.2 anterior a v4.2.16, y v4.3 anterior a v4.3.2; y (b) openSwan v2.6 anterior a v2.6.22 y v2.4 anterior a v2.4.15 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio IKE pluto) a trav\u00e9s de un certificado X.509 con (1) Nombres Caracterizados Relativos (RDNs) (2) una cadena UTCTIME manipulada, o (3) una cadena GENERALIZEDTIME manipulada." } ], "id": "CVE-2009-2185", "lastModified": "2024-11-21T01:04:19.203", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-06-25T02:00:00.297", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://download.strongswan.org/CHANGES2.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://download.strongswan.org/CHANGES4.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://download.strongswan.org/CHANGES42.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35522" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/35698" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/35740" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/35804" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/36922" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/36950" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37504" }, { "source": "cve@mitre.org", "url": "http://up2date.astaro.com/2009/07/up2date_7404_released.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2009/dsa-1898" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2009/dsa-1899" }, { "source": "cve@mitre.org", "url": "http://www.ingate.com/Relnote.php?ver=481" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2009-1138.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/35452" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022428" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1639" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/1706" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/1829" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/3354" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://download.strongswan.org/CHANGES2.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://download.strongswan.org/CHANGES4.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://download.strongswan.org/CHANGES42.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/36922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/36950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37504" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://up2date.astaro.com/2009/07/up2date_7404_released.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2009/dsa-1898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2009/dsa-1899" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ingate.com/Relnote.php?ver=481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-1138.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/35452" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1639" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1829" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/3354" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "D734AD8D-AE91-47C7-BD4D-467CFB63D163", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*", "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a packet." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en programs/pluto/xauth.c en el cliente en Openswan v2.6.25 a v2.6.28 podr\u00eda permitir ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de puertas de enlace remoto autenticadas o causar una denegaci\u00f3n de servicio a trav\u00e9s de datos demasiado largos en los campos (1) cisco_dns_info o (2) cisco_domain_info." } ], "id": "CVE-2010-3302", "lastModified": "2024-11-21T01:18:28.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-10-05T22:00:05.410", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/41769" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/43588" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1024749" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2526" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/41769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/43588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024749" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2526" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*", "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en programs/pluto/xauth.c en el cliente en Openswan v2.6.26 a v2.6.28 podr\u00eda permitir ejecutar c\u00f3digo de su elecci\u00f3n a gateways autenticados remotos o causar una denegaci\u00f3n de servicio a trav\u00e9s de valor excesivamente largo en cisco_banner (tambi\u00e9n conocido como server_banner)." } ], "id": "CVE-2010-3308", "lastModified": "2024-11-21T01:18:29.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-10-05T22:00:05.927", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/41769" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/43588" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1024749" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2526" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/41769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/43588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024749" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2526" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*", "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308." }, { "lang": "es", "value": "programs/pluto/xauth.c en el cliente en Openswan v2.6.26 a v2.6.28 permite ejecutar, a gateways autenticados remotos, comandos de su elecci\u00f3n a trav\u00e9s de metacaracteres encubiertos en el campo cisco_banner (tambi\u00e9n conocido como server_banner). Se trata de una vulnerabilidad diferente a CVE-2010-3308." } ], "id": "CVE-2010-3753", "lastModified": "2024-11-21T01:19:30.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-10-05T22:00:06.020", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/43588" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1024749" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2526" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/43588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024749" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2526" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strongswan:strongswan:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "339E325D-B76C-400C-B332-7CA675C4F72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.4.0a:*:*:*:*:*:*:*", "matchCriteriaId": "F90373CD-E5C7-46BE-8C5F-22D3DE12A3E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B8C12F9-A14F-4BC5-A2CC-18DADE8454C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C78E4DAD-B255-4666-927F-D82AC7396FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "9B602806-1420-4640-AD17-A2FEFDA6A967", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "A203ADA7-54C9-4F37-A254-0A5378BB9B1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3D09EEB6-386C-4A73-BC08-4243BDC49EE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "DBE3B5F4-063F-4AE9-B589-932751182101", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "6AFD8D5D-7FB7-4B25-B1F2-7850348A6924", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "24F75943-1327-4868-88D5-917D06BCF5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "A4BE9083-EF34-4B1A-A139-E779E9704F88", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5518A917-D5D1-4985-BF71-B1A34BD3D5B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "778D7442-F54A-47DF-B87B-3CFA3CF08799", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "2A4B1F28-B3B8-4E31-8E4E-25F5A29F3AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "16984E6E-7CA8-4DC3-B800-FFE007617FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "4C85F0BE-7E89-4B79-A036-9238785BE705", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "8DFF4780-2F92-4DF3-878A-C7E2BD57E39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "6C794994-9367-4BBB-8940-BBB44B7C1C5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "082272D3-0FE4-4959-978A-FFF795B52CA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:2.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "8DFEF9B3-C7F7-4588-A174-FAFD39C04116", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "97027262-849C-4DE9-90C9-0D9FBBC9F96B", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8658539D-27D8-47EE-9468-A6B625E6D45F", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "89ACA351-D10F-4D1A-95B0-4B2E329F1E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7A4D6E89-5313-4016-8A7E-036579330DB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "95A8E226-FCEC-4545-A628-24F5A8103BCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "1B944D80-A8B9-4034-A95B-BA92ADC8D4E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "F5267BCC-A51C-4F3B-840C-49EF9C2A15F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8CDCDB4B-2DF5-4394-B33A-08A4B6604D92", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "66206A52-373C-4DBB-A3D7-2A7569C0181E", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F654D3C4-D3A3-41E1-A0D8-3A384319AE08", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "C41F9E10-000D-4F3B-BEA6-DEE87405B89B", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "4F37DFE8-2996-4904-B733-7BAECA95CB48", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "38209DC9-3BE6-49EF-8BA1-6E2BC5D24FEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:strongswan:strongswan:4.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "155EB8F5-7C3C-4293-91EE-62DA561DA54A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7841F42-1226-43C4-A007-88847925D872", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "77930F86-13FF-4787-A39F-2D00110AFBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B1ADD64-2503-4EED-9F6F-E425A3406123", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3067BE9-4314-42BD-8131-89C4899F7D47", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "E00CA6E5-1F63-4D59-BA72-0F8697671718", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "C35A2049-8502-41F2-894E-E39AEBEB6816", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "DD82E956-8C8E-4B38-9E82-4AA9AEFE6891", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "2D0F0EA4-A0DF-48CC-9B42-465A36945503", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*", "matchCriteriaId": "78325087-599F-448B-8C47-570914FF6C59", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*", "matchCriteriaId": "059CFA5C-B262-47AF-94A6-8E74AFB19204", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*", "matchCriteriaId": "12F25627-235B-4312-80A4-4E36DE0E72A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*", "matchCriteriaId": "B3E70B88-6348-42BB-AE96-46BDB1F3C6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*", "matchCriteriaId": "12A9DF25-48E8-4D52-A267-1BE0437E9000", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*", "matchCriteriaId": "C986533F-E320-46FA-A9F7-DAFDB1A0628A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*", "matchCriteriaId": "7C77DED4-2696-4172-92B7-43034E61F845", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "BED1BA7D-B603-49D4-9080-4A9FEC056A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "207B98DB-5962-4F62-AF5B-D48EF0C0E2A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "DFB65639-AE3A-4984-93F9-2A8100DCEE6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "B8921D08-FBA3-4C0A-8944-362909C5EB6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "3FBD5312-E44F-4996-AA29-AFED53A90E8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E1B24C96-47DF-4FA2-8DF4-8241F4964F5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "A5067B83-AB9E-4819-B5A2-B14A96EB54C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "773B9BB2-0F65-4604-AF2C-8AC396DDC094", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "AA892169-0079-48D9-AEF5-641748CE1BF2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD." }, { "lang": "es", "value": "El demonio IKE pluto de Openswan y Strongswan IPsec v2.6 anterior a v2.6.21 y v2.4 anterior a v2.4.14, y Strongswan v4.2 anterior a v4.2.14 y v2.8 anteior a v2.8.9; permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio y reinicio) a trav\u00e9s de (1) R_U_THERE o (2) R_U_THERE_ACK Detecci\u00f3n de pares muertos (Dead Peer Detection -DPD) mensaje de Notificaci\u00f3n IKE IPsec que provoca una referencia a puntero nulo relacionado con el estado inconsistente ISAKMP y la falta de un estado de asociacion phase2 en DPD." } ], "id": "CVE-2009-0790", "lastModified": "2024-11-21T01:00:55.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-04-01T10:30:00.267", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://download.strongswan.org/CHANGES4.txt" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34472" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34483" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34494" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34546" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2009/dsa-1759" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2009/dsa-1760" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/502270/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/34296" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1021949" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1021950" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2009/0886" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49523" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://download.strongswan.org/CHANGES4.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34494" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2009/dsa-1759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2009/dsa-1760" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/502270/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/34296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021949" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0886" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49523" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openswan:openswan:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "83BD9C38-8D11-4A21-9A80-83D4D02ECC3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7BF7EA37-F5B2-4EBE-A959-29F559A47F47", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "6C062450-8D41-4E0C-AEAD-6C51D9B8F107", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4D15B299-2298-4617-8CED-5F98C2E68D07", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "F7FA0C68-A45A-42EB-9F1F-E911F32589BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "411E9D06-5756-4918-965C-3E83890F0316", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A9EABDE-514F-42BA-A335-135209605981", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2425AF51-C42B-4EAA-A619-EE47EAFCBA83", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "892D939B-4649-4B90-A2C0-6C2E4DDF7DFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "1A321B57-5E08-48C8-9288-A92342770FD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "54780B50-9CFE-43B6-8BB9-C7246F817773", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "001E2700-CE33-495A-8F8A-81E2E550CFF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openswan:openswan:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "6A628FE6-A042-4DF9-A141-8BE65FD236C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "112D7B10-50E4-4903-9E34-DB4857D6C658", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7841F42-1226-43C4-A007-88847925D872", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "77930F86-13FF-4787-A39F-2D00110AFBFC", "vulnerable": false }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B1ADD64-2503-4EED-9F6F-E425A3406123", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3067BE9-4314-42BD-8131-89C4899F7D47", "vulnerable": false }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "E00CA6E5-1F63-4D59-BA72-0F8697671718", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "C35A2049-8502-41F2-894E-E39AEBEB6816", "vulnerable": false }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "1109A84D-1815-4A7B-8EDA-E493A1973224", "vulnerable": false }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "B20531A3-F6F8-4FE1-9C0A-FDFABAC4C6AA", "vulnerable": false }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9F212AE-D5B3-4A88-A1E6-00A13A0A2AD5", "vulnerable": false }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "DD82E956-8C8E-4B38-9E82-4AA9AEFE6891", "vulnerable": false }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "2D0F0EA4-A0DF-48CC-9B42-465A36945503", "vulnerable": false }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "8945D2A7-B1C3-4981-B840-FB046AB6F4B6", "vulnerable": false }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "338E969E-2CC6-44F3-A938-EE7131375AB8", "vulnerable": false }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*", "matchCriteriaId": "78325087-599F-448B-8C47-570914FF6C59", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*", "matchCriteriaId": "059CFA5C-B262-47AF-94A6-8E74AFB19204", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*", "matchCriteriaId": "12F25627-235B-4312-80A4-4E36DE0E72A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*", "matchCriteriaId": "B3E70B88-6348-42BB-AE96-46BDB1F3C6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*", "matchCriteriaId": "12A9DF25-48E8-4D52-A267-1BE0437E9000", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*", "matchCriteriaId": "C986533F-E320-46FA-A9F7-DAFDB1A0628A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*", "matchCriteriaId": "7C77DED4-2696-4172-92B7-43034E61F845", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "BED1BA7D-B603-49D4-9080-4A9FEC056A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "207B98DB-5962-4F62-AF5B-D48EF0C0E2A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "DFB65639-AE3A-4984-93F9-2A8100DCEE6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "B8921D08-FBA3-4C0A-8944-362909C5EB6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "3FBD5312-E44F-4996-AA29-AFED53A90E8E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IPSEC livetest tool in Openswan 2.4.12 and earlier, and 2.6.x through 2.6.16, allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack on the (1) ipseclive.conn and (2) ipsec.olts.remote.log temporary files. NOTE: in many distributions and the upstream version, this tool has been disabled." }, { "lang": "es", "value": "La herramienta livetest de IPSEC en Openswan versi\u00f3n 2.4.12 y anteriores, y versiones 2.6.x hasta 2.6.16, permite a los usuarios locales sobrescribir archivos arbitrarios y ejecutar c\u00f3digo arbitrario mediante un ataque de tipo symlink en los archivos temporales (1) ipseclive.conn y (2) ipsec.olts.remote.log. NOTA: en muchas distribuciones y en la versi\u00f3n anterior, esta herramienta se ha deshabilitado." } ], "id": "CVE-2008-4190", "lastModified": "2024-11-21T00:51:07.377", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-09-24T11:42:25.250", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374" }, { "source": "cve@mitre.org", "url": "http://dev.gentoo.org/~rbu/security/debiantemp/openswan" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34182" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34472" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2009/dsa-1760" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/501624/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/501640/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/31243" }, { "source": "cve@mitre.org", "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460425" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45250" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10078" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/9135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.gentoo.org/~rbu/security/debiantemp/openswan" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2009/dsa-1760" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/501624/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/501640/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/31243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460425" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/9135" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue has been addressed via: https://rhn.redhat.com/errata/RHSA-2009-0402.html", "lastModified": "2009-03-30T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openswan:openswan:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2411B8B-FE2A-4E99-A280-0FB39291E96F", "versionEndIncluding": "1.0.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "39C5F91B-EE8A-4A81-A21D-68A3F4295200", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code." } ], "id": "CVE-2005-0162", "lastModified": "2024-11-20T23:54:33.273", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-01-26T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/14038" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/14062" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1013014" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=190\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.openswan.org/support/vuln/IDEF0785/" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/13195" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/12377" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/14038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/14062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1013014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=190\u0026type=vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.openswan.org/support/vuln/IDEF0785/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/13195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/12377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19078" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.40:*:*:*:*:*:*:*", "matchCriteriaId": "9D4E7464-19DE-428C-93B7-283377156C54", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466." }, { "lang": "es", "value": "Openswan 2.6.40 permite a atacantes remotos causar una denegaci\u00f3n de servicio (referencia a puntero nulo y reinicio del demonio IKE) a trav\u00e9s de paquetes IKEv2 que no llevan las cargas esperadas. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta para CVE 2013-6466." } ], "id": "CVE-2014-2037", "lastModified": "2024-11-21T02:05:30.630", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-26T15:59:00.090", "references": [ { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/02/18/1" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/02/20/2" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/65629" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://lists.openswan.org/pipermail/users/2014-February/022898.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/02/18/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/02/20/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://lists.openswan.org/pipermail/users/2014-February/022898.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "D734AD8D-AE91-47C7-BD4D-467CFB63D163", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "FE595B96-0618-4DF3-B7C3-479A1DD02670", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*", "matchCriteriaId": "F38B9927-1918-4380-8265-E8915D49AECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A8294-58D5-429D-9061-EE897AAAED80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerability than CVE-2010-3302." }, { "lang": "es", "value": "programs/pluto/xauth.c en el cliente en Openswan v2.6.26 a v2.6.28 permite ejecutar, a gateways autenticados remotos, comandos de su elecci\u00f3n a trav\u00e9s de metacaracteres encubiertos en el campo cisco_banner (tambi\u00e9n conocido como server_banner). Se trata de una vulnerabilidad diferente a CVE-2010-3308." } ], "id": "CVE-2010-3752", "lastModified": "2024-11-21T01:19:30.733", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-10-05T22:00:05.973", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/43588" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1024749" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2526" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/43588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024749" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2526" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*", "matchCriteriaId": "CFAFF39D-126F-4984-A40B-88E94C680141", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*", "matchCriteriaId": "73EE725B-C26E-4343-B5F2-F5DF31A197C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*", "matchCriteriaId": "A26D9508-E43D-4BA2-9734-CDABBD405D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*", "matchCriteriaId": "01D11526-6DCD-4B73-BACC-FC619D92BBB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*", "matchCriteriaId": "24641D2D-BB95-4E26-AD96-8CE96B6B3976", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*", "matchCriteriaId": "A24A87F0-AE9A-46DB-8E47-7819E18513CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*", "matchCriteriaId": "13460979-98A3-4873-B9E4-86327F9C2B2A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Openswan 2.6.29 through 2.6.35 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto IKE daemon crash) via an ISAKMP message with an invalid KEY_LENGTH attribute, which is not properly handled by the error handling function." }, { "lang": "es", "value": "Openswan v2.6.29 a trav\u00e9s de v2.6.35 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (puntero a NULL y Plut\u00f3n accidente demonio IKE) a trav\u00e9s de un mensaje ISAKMP con un atributo no v\u00e1lido key_length, que no se gestiona adecuadamente por la funci\u00f3n de control de errores." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n\u0027CWE-476: NULL Pointer Dereference\u0027", "id": "CVE-2011-3380", "lastModified": "2024-11-21T01:30:24.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-11-17T19:55:01.127", "references": [ { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/46306" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openswan.org/download/CVE-2011-3380/CVE-2011-3380.txt" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-1356.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/46306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openswan.org/download/CVE-2011-3380/CVE-2011-3380.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-1356.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2011-3380
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.openswan.org/download/CVE-2011-3380/CVE-2011-3380.txt | x_refsource_CONFIRM | |
http://secunia.com/advisories/46306 | third-party-advisory, x_refsource_SECUNIA | |
http://www.redhat.com/support/errata/RHSA-2011-1356.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/download/CVE-2011-3380/CVE-2011-3380.txt" }, { "name": "46306", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46306" }, { "name": "RHSA-2011:1356", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1356.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Openswan 2.6.29 through 2.6.35 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto IKE daemon crash) via an ISAKMP message with an invalid KEY_LENGTH attribute, which is not properly handled by the error handling function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-11-24T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/download/CVE-2011-3380/CVE-2011-3380.txt" }, { "name": "46306", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46306" }, { "name": "RHSA-2011:1356", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1356.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-3380", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Openswan 2.6.29 through 2.6.35 allows remote attackers to cause a denial of service (NULL pointer dereference and pluto IKE daemon crash) via an ISAKMP message with an invalid KEY_LENGTH attribute, which is not properly handled by the error handling function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openswan.org/download/CVE-2011-3380/CVE-2011-3380.txt", "refsource": "CONFIRM", "url": "http://www.openswan.org/download/CVE-2011-3380/CVE-2011-3380.txt" }, { "name": "46306", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46306" }, { "name": "RHSA-2011:1356", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-1356.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-3380", "datePublished": "2011-11-17T19:00:00", "dateReserved": "2011-08-30T00:00:00", "dateUpdated": "2024-08-06T23:29:56.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2037
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2014/02/18/1 | mailing-list, x_refsource_MLIST | |
https://lists.openswan.org/pipermail/users/2014-February/022898.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/02/20/2 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/65629 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:58:16.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20140217 Re: CVE request for unfixed CVE-2013-6466 in openswan-2.6.40", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/02/18/1" }, { "name": "[Openswan Users] 20140221 Openswan 2.6.41 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.openswan.org/pipermail/users/2014-February/022898.html" }, { "name": "[oss-security] 20140220 Re: CVE request for unfixed CVE-2013-6466 in openswan-2.6.40", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/02/20/2" }, { "name": "65629", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65629" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-11-26T13:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20140217 Re: CVE request for unfixed CVE-2013-6466 in openswan-2.6.40", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/02/18/1" }, { "name": "[Openswan Users] 20140221 Openswan 2.6.41 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.openswan.org/pipermail/users/2014-February/022898.html" }, { "name": "[oss-security] 20140220 Re: CVE request for unfixed CVE-2013-6466 in openswan-2.6.40", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/02/20/2" }, { "name": "65629", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65629" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20140217 Re: CVE request for unfixed CVE-2013-6466 in openswan-2.6.40", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/02/18/1" }, { "name": "[Openswan Users] 20140221 Openswan 2.6.41 released", "refsource": "MLIST", "url": "https://lists.openswan.org/pipermail/users/2014-February/022898.html" }, { "name": "[oss-security] 20140220 Re: CVE request for unfixed CVE-2013-6466 in openswan-2.6.40", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/02/20/2" }, { "name": "65629", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65629" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2037", "datePublished": "2014-11-26T15:00:00", "dateReserved": "2014-02-19T00:00:00", "dateUpdated": "2024-08-06T09:58:16.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-0790
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:48:52.007Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openswan-strongswan-dpd-dos(49523)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49523" }, { "name": "34494", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34494" }, { "name": "oval:org.mitre.oval:def:11171", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171" }, { "name": "34472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34472" }, { "name": "DSA-1759", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1759" }, { "name": "ADV-2009-0886", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0886" }, { "name": "1021949", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021949" }, { "name": "34546", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34546" }, { "name": "20090330 CVE-2009-0790: ISAKMP DPD Remote Vulnerability with Openswan \u0026 Strongswan IPsec", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/502270/100/0/threaded" }, { "name": "34483", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34483" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt" }, { "name": "1021950", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021950" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.strongswan.org/CHANGES4.txt" }, { "name": "SUSE-SR:2009:009", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" }, { "name": "RHSA-2009:0402", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html" }, { "name": "DSA-1760", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1760" }, { "name": "34296", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34296" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-03-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "openswan-strongswan-dpd-dos(49523)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49523" }, { "name": "34494", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34494" }, { "name": "oval:org.mitre.oval:def:11171", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171" }, { "name": "34472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34472" }, { "name": "DSA-1759", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1759" }, { "name": "ADV-2009-0886", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0886" }, { "name": "1021949", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021949" }, { "name": "34546", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34546" }, { "name": "20090330 CVE-2009-0790: ISAKMP DPD Remote Vulnerability with Openswan \u0026 Strongswan IPsec", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/502270/100/0/threaded" }, { "name": "34483", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34483" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt" }, { "name": "1021950", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021950" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.strongswan.org/CHANGES4.txt" }, { "name": "SUSE-SR:2009:009", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" }, { "name": "RHSA-2009:0402", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html" }, { "name": "DSA-1760", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1760" }, { "name": "34296", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34296" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-0790", "datePublished": "2009-04-01T10:00:00", "dateReserved": "2009-03-04T00:00:00", "dateUpdated": "2024-08-07T04:48:52.007Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3753
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2010/2526 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/43588 | vdb-entry, x_refsource_BID | |
http://www.redhat.com/support/errata/RHSA-2010-0892.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securitytracker.com/id?1024749 | vdb-entry, x_refsource_SECTRACK | |
http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch | x_refsource_CONFIRM | |
http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:53.060Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2010-2526", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2526" }, { "name": "43588", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43588" }, { "name": "RHSA-2010:0892", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "name": "1024749", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024749" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-09-27T00:00:00", "descriptions": [ { "lang": "en", "value": "programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-12-07T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2010-2526", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2526" }, { "name": "43588", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43588" }, { "name": "RHSA-2010:0892", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "name": "1024749", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024749" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3753", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2010-2526", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2526" }, { "name": "43588", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43588" }, { "name": "RHSA-2010:0892", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "name": "1024749", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024749" }, { "name": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch", "refsource": "CONFIRM", "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "name": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt", "refsource": "CONFIRM", "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3753", "datePublished": "2010-10-05T21:00:00", "dateReserved": "2010-10-05T00:00:00", "dateUpdated": "2024-08-07T03:18:53.060Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-4190
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:08:34.945Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34472" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460425" }, { "name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770" }, { "name": "20090309 Re: [ GLSA 200903-18 ] Openswan: Insecure temporary file creation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/501624/100/0/threaded" }, { "name": "34182", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34182" }, { "name": "20090310 Re: [ GLSA 200903-18 ] Openswan: Insecure temporary file creation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/501640/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:10078", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10078" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.gentoo.org/~rbu/security/debiantemp/openswan" }, { "name": "31243", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31243" }, { "name": "9135", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/9135" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374" }, { "name": "RHSA-2009:0402", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html" }, { "name": "openswan-livetest-symlink(45250)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45250" }, { "name": "DSA-1760", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1760" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The IPSEC livetest tool in Openswan 2.4.12 and earlier, and 2.6.x through 2.6.16, allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack on the (1) ipseclive.conn and (2) ipsec.olts.remote.log temporary files. NOTE: in many distributions and the upstream version, this tool has been disabled." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34472" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460425" }, { "name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770" }, { "name": "20090309 Re: [ GLSA 200903-18 ] Openswan: Insecure temporary file creation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/501624/100/0/threaded" }, { "name": "34182", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34182" }, { "name": "20090310 Re: [ GLSA 200903-18 ] Openswan: Insecure temporary file creation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/501640/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:10078", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10078" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.gentoo.org/~rbu/security/debiantemp/openswan" }, { "name": "31243", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31243" }, { "name": "9135", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/9135" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374" }, { "name": "RHSA-2009:0402", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html" }, { "name": "openswan-livetest-symlink(45250)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45250" }, { "name": "DSA-1760", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1760" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4190", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IPSEC livetest tool in Openswan 2.4.12 and earlier, and 2.6.x through 2.6.16, allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack on the (1) ipseclive.conn and (2) ipsec.olts.remote.log temporary files. NOTE: in many distributions and the upstream version, this tool has been disabled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34472", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34472" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=460425", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=460425" }, { "name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/10/30/2" }, { "name": "https://bugs.gentoo.org/show_bug.cgi?id=235770", "refsource": "CONFIRM", "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770" }, { "name": "20090309 Re: [ GLSA 200903-18 ] Openswan: Insecure temporary file creation", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/501624/100/0/threaded" }, { "name": "34182", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34182" }, { "name": "20090310 Re: [ GLSA 200903-18 ] Openswan: Insecure temporary file creation", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/501640/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:10078", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10078" }, { "name": "http://dev.gentoo.org/~rbu/security/debiantemp/openswan", "refsource": "CONFIRM", "url": "http://dev.gentoo.org/~rbu/security/debiantemp/openswan" }, { "name": "31243", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31243" }, { "name": "9135", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/9135" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374" }, { "name": "RHSA-2009:0402", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-0402.html" }, { "name": "openswan-livetest-symlink(45250)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45250" }, { "name": "DSA-1760", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1760" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4190", "datePublished": "2008-09-24T10:00:00", "dateReserved": "2008-09-23T00:00:00", "dateUpdated": "2024-08-07T10:08:34.945Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3752
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2010/2526 | vdb-entry, x_refsource_VUPEN | |
http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/43588 | vdb-entry, x_refsource_BID | |
http://www.redhat.com/support/errata/RHSA-2010-0892.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securitytracker.com/id?1024749 | vdb-entry, x_refsource_SECTRACK | |
http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch | x_refsource_CONFIRM | |
http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:53.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2010-2526", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2526" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt" }, { "name": "43588", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43588" }, { "name": "RHSA-2010:0892", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "name": "1024749", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024749" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-09-27T00:00:00", "descriptions": [ { "lang": "en", "value": "programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerability than CVE-2010-3302." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-12-07T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2010-2526", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2526" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt" }, { "name": "43588", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43588" }, { "name": "RHSA-2010:0892", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "name": "1024749", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024749" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3752", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerability than CVE-2010-3302." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2010-2526", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2526" }, { "name": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt", "refsource": "CONFIRM", "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt" }, { "name": "43588", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43588" }, { "name": "RHSA-2010:0892", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "name": "1024749", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024749" }, { "name": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch", "refsource": "CONFIRM", "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "name": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch", "refsource": "CONFIRM", "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3752", "datePublished": "2010-10-05T21:00:00", "dateReserved": "2010-10-05T00:00:00", "dateUpdated": "2024-08-07T03:18:53.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-3671
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:17:23.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en" }, { "name": "15416", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15416" }, { "name": "FEDORA-2005-1093", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html" }, { "name": "1015214", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015214" }, { "name": "17581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17581" }, { "name": "20051214 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://jvn.jp/niscc/NISCC-273756/index.html" }, { "name": "20051213 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html" }, { "name": "GLSA-200512-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/" }, { "name": "VU#226364", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/226364" }, { "name": "18115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18115" }, { "name": "17680", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17680" }, { "name": "FEDORA-2005-1092", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/niscc2/" }, { "name": "17980", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17980" }, { "name": "SUSE-SA:2005:070", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_70_ipsec.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-11-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-24T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en" }, { "name": "15416", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15416" }, { "name": "FEDORA-2005-1093", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html" }, { "name": "1015214", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015214" }, { "name": "17581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17581" }, { "name": "20051214 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://jvn.jp/niscc/NISCC-273756/index.html" }, { "name": "20051213 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html" }, { "name": "GLSA-200512-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/" }, { "name": "VU#226364", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/226364" }, { "name": "18115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18115" }, { "name": "17680", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17680" }, { "name": "FEDORA-2005-1092", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/niscc2/" }, { "name": "17980", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17980" }, { "name": "SUSE-SA:2005:070", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_70_ipsec.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3671", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en" }, { "name": "15416", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15416" }, { "name": "FEDORA-2005-1093", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00058.html" }, { "name": "1015214", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015214" }, { "name": "17581", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17581" }, { "name": "20051214 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0161.html" }, { "name": "http://jvn.jp/niscc/NISCC-273756/index.html", "refsource": "MISC", "url": "http://jvn.jp/niscc/NISCC-273756/index.html" }, { "name": "20051213 Re: [ GLSA 200512-04 ] Openswan, IPsec-Tools: Vulnerabilities in ISAK MP Protocol implementation", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0138.html" }, { "name": "GLSA-200512-04", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml" }, { "name": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/", "refsource": "MISC", "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/" }, { "name": "VU#226364", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/226364" }, { "name": "18115", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18115" }, { "name": "17680", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17680" }, { "name": "FEDORA-2005-1092", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-November/msg00057.html" }, { "name": "http://www.openswan.org/niscc2/", "refsource": "CONFIRM", "url": "http://www.openswan.org/niscc2/" }, { "name": "17980", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17980" }, { "name": "SUSE-SA:2005:070", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_70_ipsec.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3671", "datePublished": "2005-11-18T21:00:00", "dateReserved": "2005-11-18T00:00:00", "dateUpdated": "2024-08-07T23:17:23.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-6466
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt | x_refsource_MISC | |
http://www.securityfocus.com/bid/65155 | vdb-entry, x_refsource_BID | |
https://cert.vde.com/en-us/advisories/vde-2017-001 | x_refsource_CONFIRM | |
http://rhn.redhat.com/errata/RHSA-2014-0185.html | vendor-advisory, x_refsource_REDHAT | |
http://www.debian.org/security/2014/dsa-2893 | vendor-advisory, x_refsource_DEBIAN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/90524 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:01.444Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" }, { "name": "65155", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65155" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2017-001" }, { "name": "RHSA-2014:0185", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html" }, { "name": "DSA-2893", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2893" }, { "name": "openswan-cve20136466-dos(90524)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-16T13:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" }, { "name": "65155", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65155" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2017-001" }, { "name": "RHSA-2014:0185", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0185.html" }, { "name": "DSA-2893", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2893" }, { "name": "openswan-cve20136466-dos(90524)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6466", "datePublished": "2014-01-26T20:00:00", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15836
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://lists.openswan.org/pipermail/users/2018-August/023761.html | mailing-list, x_refsource_MLIST | |
https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d | x_refsource_CONFIRM | |
https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:01:54.675Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[openswan-users] 20180824 Xelerance has released Openswan 2.6.50.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.openswan.org/pipermail/users/2018-August/023761.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "In verify_signed_hash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used. IKEv2 signature verification is affected when RAW RSA keys are used." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-28T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[openswan-users] 20180824 Xelerance has released Openswan 2.6.50.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.openswan.org/pipermail/users/2018-August/023761.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-15836", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In verify_signed_hash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used. IKEv2 signature verification is affected when RAW RSA keys are used." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[openswan-users] 20180824 Xelerance has released Openswan 2.6.50.1", "refsource": "MLIST", "url": "https://lists.openswan.org/pipermail/users/2018-August/023761.html" }, { "name": "https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d", "refsource": "CONFIRM", "url": "https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d" }, { "name": "https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51", "refsource": "CONFIRM", "url": "https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-15836", "datePublished": "2018-09-26T21:00:00", "dateReserved": "2018-08-23T00:00:00", "dateUpdated": "2024-08-05T10:01:54.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2185
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:44:55.585Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2009-1639", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1639" }, { "name": "35740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35740" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ingate.com/Relnote.php?ver=481" }, { "name": "1022428", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022428" }, { "name": "RHSA-2009:1138", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1138.html" }, { "name": "ADV-2009-1706", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1706" }, { "name": "oval:org.mitre.oval:def:11079", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079" }, { "name": "36950", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36950" }, { "name": "35522", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35522" }, { "name": "36922", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36922" }, { "name": "37504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37504" }, { "name": "DSA-1899", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1899" }, { "name": "35452", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35452" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.strongswan.org/CHANGES42.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.strongswan.org/CHANGES2.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://up2date.astaro.com/2009/07/up2date_7404_released.html" }, { "name": "DSA-1898", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1898" }, { "name": "ADV-2009-1829", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1829" }, { "name": "FEDORA-2009-7478", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html" }, { "name": "35698", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35698" }, { "name": "ADV-2009-3354", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3354" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.strongswan.org/CHANGES4.txt" }, { "name": "FEDORA-2009-7423", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html" }, { "name": "35804", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35804" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-06-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2009-1639", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1639" }, { "name": "35740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35740" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ingate.com/Relnote.php?ver=481" }, { "name": "1022428", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022428" }, { "name": "RHSA-2009:1138", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1138.html" }, { "name": "ADV-2009-1706", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1706" }, { "name": "oval:org.mitre.oval:def:11079", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079" }, { "name": "36950", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36950" }, { "name": "35522", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35522" }, { "name": "36922", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36922" }, { "name": "37504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37504" }, { "name": "DSA-1899", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1899" }, { "name": "35452", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35452" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.strongswan.org/CHANGES42.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.strongswan.org/CHANGES2.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://up2date.astaro.com/2009/07/up2date_7404_released.html" }, { "name": "DSA-1898", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1898" }, { "name": "ADV-2009-1829", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1829" }, { "name": "FEDORA-2009-7478", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html" }, { "name": "35698", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35698" }, { "name": "ADV-2009-3354", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3354" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.strongswan.org/CHANGES4.txt" }, { "name": "FEDORA-2009-7423", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html" }, { "name": "35804", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35804" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2185", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2009-1639", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1639" }, { "name": "35740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35740" }, { "name": "http://www.ingate.com/Relnote.php?ver=481", "refsource": "CONFIRM", "url": "http://www.ingate.com/Relnote.php?ver=481" }, { "name": "1022428", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022428" }, { "name": "RHSA-2009:1138", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1138.html" }, { "name": "ADV-2009-1706", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1706" }, { "name": "oval:org.mitre.oval:def:11079", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11079" }, { "name": "36950", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36950" }, { "name": "35522", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35522" }, { "name": "36922", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36922" }, { "name": "37504", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37504" }, { "name": "DSA-1899", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1899" }, { "name": "35452", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35452" }, { "name": "http://download.strongswan.org/CHANGES42.txt", "refsource": "CONFIRM", "url": "http://download.strongswan.org/CHANGES42.txt" }, { "name": "http://download.strongswan.org/CHANGES2.txt", "refsource": "CONFIRM", "url": "http://download.strongswan.org/CHANGES2.txt" }, { "name": "http://up2date.astaro.com/2009/07/up2date_7404_released.html", "refsource": "CONFIRM", "url": "http://up2date.astaro.com/2009/07/up2date_7404_released.html" }, { "name": "DSA-1898", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1898" }, { "name": "ADV-2009-1829", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1829" }, { "name": "FEDORA-2009-7478", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00337.html" }, { "name": "35698", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35698" }, { "name": "ADV-2009-3354", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3354" }, { "name": "http://download.strongswan.org/CHANGES4.txt", "refsource": "CONFIRM", "url": "http://download.strongswan.org/CHANGES4.txt" }, { "name": "FEDORA-2009-7423", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00264.html" }, { "name": "35804", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35804" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2185", "datePublished": "2009-06-24T23:00:00", "dateReserved": "2009-06-24T00:00:00", "dateUpdated": "2024-08-07T05:44:55.585Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4073
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/47342 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/50440 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2011/dsa-2374 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/46678 | third-party-advisory, x_refsource_SECUNIA | |
http://www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt | x_refsource_CONFIRM | |
http://www.redhat.com/support/errata/RHSA-2011-1422.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securitytracker.com/id?1026268 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/46681 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:53:32.636Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "47342", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47342" }, { "name": "50440", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/50440" }, { "name": "DSA-2374", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2374" }, { "name": "46678", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46678" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt" }, { "name": "RHSA-2011:1422", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1422.html" }, { "name": "1026268", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026268" }, { "name": "46681", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46681" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-12-13T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "47342", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47342" }, { "name": "50440", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/50440" }, { "name": "DSA-2374", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2374" }, { "name": "46678", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46678" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt" }, { "name": "RHSA-2011:1422", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1422.html" }, { "name": "1026268", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026268" }, { "name": "46681", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46681" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4073", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "47342", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47342" }, { "name": "50440", "refsource": "BID", "url": "http://www.securityfocus.com/bid/50440" }, { "name": "DSA-2374", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2374" }, { "name": "46678", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46678" }, { "name": "http://www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt", "refsource": "CONFIRM", "url": "http://www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt" }, { "name": "RHSA-2011:1422", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-1422.html" }, { "name": "1026268", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026268" }, { "name": "46681", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46681" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4073", "datePublished": "2011-11-17T19:00:00", "dateReserved": "2011-10-18T00:00:00", "dateUpdated": "2024-08-06T23:53:32.636Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3308
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/41769 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2010/2526 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/43588 | vdb-entry, x_refsource_BID | |
http://www.redhat.com/support/errata/RHSA-2010-0892.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securitytracker.com/id?1024749 | vdb-entry, x_refsource_SECTRACK | |
http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch | x_refsource_CONFIRM | |
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html | vendor-advisory, x_refsource_FEDORA | |
http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:03:18.859Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "41769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41769" }, { "name": "ADV-2010-2526", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2526" }, { "name": "43588", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43588" }, { "name": "RHSA-2010:0892", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "name": "1024749", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024749" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "name": "FEDORA-2010-15508", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html" }, { "name": "FEDORA-2010-15381", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html" }, { "name": "FEDORA-2010-15516", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-09-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-11-03T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "41769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41769" }, { "name": "ADV-2010-2526", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2526" }, { "name": "43588", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43588" }, { "name": "RHSA-2010:0892", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "name": "1024749", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024749" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "name": "FEDORA-2010-15508", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html" }, { "name": "FEDORA-2010-15381", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html" }, { "name": "FEDORA-2010-15516", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/download/CVE-2010-3308/CVE-2010-3308.txt" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3308", "datePublished": "2010-10-05T21:00:00", "dateReserved": "2010-09-13T00:00:00", "dateUpdated": "2024-08-07T03:03:18.859Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0162
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html | vendor-advisory, x_refsource_FEDORA | |
http://securitytracker.com/id?1013014 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/12377 | vdb-entry, x_refsource_BID | |
http://www.idefense.com/application/poi/display?id=190&type=vulnerabilities | third-party-advisory, x_refsource_IDEFENSE | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19078 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/14062 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/14038 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/13195 | vdb-entry, x_refsource_OSVDB | |
http://www.openswan.org/support/vuln/IDEF0785/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:05:24.748Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2005-082", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html" }, { "name": "1013014", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013014" }, { "name": "12377", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12377" }, { "name": "20050126 Openswan XAUTH/PAM Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=190\u0026type=vulnerabilities" }, { "name": "openswan-xauth-pam-bo(19078)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19078" }, { "name": "14062", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14062" }, { "name": "14038", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14038" }, { "name": "13195", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/13195" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/support/vuln/IDEF0785/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-01-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2005-082", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html" }, { "name": "1013014", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013014" }, { "name": "12377", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12377" }, { "name": "20050126 Openswan XAUTH/PAM Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=190\u0026type=vulnerabilities" }, { "name": "openswan-xauth-pam-bo(19078)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19078" }, { "name": "14062", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14062" }, { "name": "14038", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14038" }, { "name": "13195", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/13195" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/support/vuln/IDEF0785/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0162", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2005-082", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.html" }, { "name": "1013014", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013014" }, { "name": "12377", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12377" }, { "name": "20050126 Openswan XAUTH/PAM Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=190\u0026type=vulnerabilities" }, { "name": "openswan-xauth-pam-bo(19078)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19078" }, { "name": "14062", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14062" }, { "name": "14038", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14038" }, { "name": "13195", "refsource": "OSVDB", "url": "http://www.osvdb.org/13195" }, { "name": "http://www.openswan.org/support/vuln/IDEF0785/", "refsource": "CONFIRM", "url": "http://www.openswan.org/support/vuln/IDEF0785/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0162", "datePublished": "2005-01-29T05:00:00", "dateReserved": "2005-01-27T00:00:00", "dateUpdated": "2024-08-07T21:05:24.748Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3302
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:03:18.957Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "41769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41769" }, { "name": "ADV-2010-2526", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2526" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt" }, { "name": "43588", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43588" }, { "name": "RHSA-2010:0892", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "name": "1024749", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024749" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch" }, { "name": "FEDORA-2010-15508", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html" }, { "name": "FEDORA-2010-15381", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html" }, { "name": "FEDORA-2010-15516", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-09-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-11-03T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "41769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41769" }, { "name": "ADV-2010-2526", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2526" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt" }, { "name": "43588", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43588" }, { "name": "RHSA-2010:0892", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "name": "1024749", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024749" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch" }, { "name": "FEDORA-2010-15508", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html" }, { "name": "FEDORA-2010-15381", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html" }, { "name": "FEDORA-2010-15516", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3302", "datePublished": "2010-10-05T21:00:00", "dateReserved": "2010-09-13T00:00:00", "dateUpdated": "2024-08-07T03:03:18.957Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-2053
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.openswan.org/news/13 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html | vendor-advisory, x_refsource_SUSE | |
http://rhn.redhat.com/errata/RHSA-2013-0827.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/59838 | vdb-entry, x_refsource_BID | |
https://bugzilla.redhat.com/show_bug.cgi?id=960229 | x_refsource_CONFIRM | |
https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2014/dsa-2893 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.420Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openswan.org/news/13" }, { "name": "SUSE-SU-2013:1150", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html" }, { "name": "RHSA-2013:0827", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0827.html" }, { "name": "59838", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/59838" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960229" }, { "name": "[Swan-announce] 20130514 CVE-2013-2052: Libreswan remote buffer overflow in atodn()", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html" }, { "name": "DSA-2893", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2893" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-04-10T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openswan.org/news/13" }, { "name": "SUSE-SU-2013:1150", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html" }, { "name": "RHSA-2013:0827", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0827.html" }, { "name": "59838", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/59838" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960229" }, { "name": "[Swan-announce] 20130514 CVE-2013-2052: Libreswan remote buffer overflow in atodn()", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html" }, { "name": "DSA-2893", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2893" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2053", "datePublished": "2013-07-09T17:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.420Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10155
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://libreswan.org/security/CVE-2019-10155/ | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155 | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LFGPGLLKAXSLWFI62A6BZHTZSCHRCBXS/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUEXFCN7FAYBKJBQJLYCEUQUCHDEJRZW/ | vendor-advisory, x_refsource_FEDORA | |
https://access.redhat.com/errata/RHSA-2019:3391 | vendor-advisory, x_refsource_REDHAT |
Vendor | Product | Version | |
---|---|---|---|
▼ | the libreswan Project | libreswan |
Version: 3.29 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:10:09.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://libreswan.org/security/CVE-2019-10155/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155" }, { "name": "FEDORA-2019-f7fb531958", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LFGPGLLKAXSLWFI62A6BZHTZSCHRCBXS/" }, { "name": "FEDORA-2019-1bd9cfb718", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUEXFCN7FAYBKJBQJLYCEUQUCHDEJRZW/" }, { "name": "RHSA-2019:3391", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3391" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libreswan", "vendor": "the libreswan Project", "versions": [ { "status": "affected", "version": "3.29" } ] } ], "descriptions": [ { "lang": "en", "value": "The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-354", "description": "CWE-354", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-06T00:07:32", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://libreswan.org/security/CVE-2019-10155/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155" }, { "name": "FEDORA-2019-f7fb531958", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LFGPGLLKAXSLWFI62A6BZHTZSCHRCBXS/" }, { "name": "FEDORA-2019-1bd9cfb718", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUEXFCN7FAYBKJBQJLYCEUQUCHDEJRZW/" }, { "name": "RHSA-2019:3391", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3391" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-10155", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "libreswan", "version": { "version_data": [ { "version_value": "3.29" } ] } } ] }, "vendor_name": "the libreswan Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29." } ] }, "impact": { "cvss": [ [ { "vectorString": "3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-354" } ] } ] }, "references": { "reference_data": [ { "name": "https://libreswan.org/security/CVE-2019-10155/", "refsource": "MISC", "url": "https://libreswan.org/security/CVE-2019-10155/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155" }, { "name": "FEDORA-2019-f7fb531958", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFGPGLLKAXSLWFI62A6BZHTZSCHRCBXS/" }, { "name": "FEDORA-2019-1bd9cfb718", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUEXFCN7FAYBKJBQJLYCEUQUCHDEJRZW/" }, { "name": "RHSA-2019:3391", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3391" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-10155", "datePublished": "2019-06-12T13:51:01", "dateReserved": "2019-03-27T00:00:00", "dateUpdated": "2024-08-04T22:10:09.974Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201411-0042
Vulnerability from variot
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466. Openswan is a VPN implemented using ipsec technology. Openswan is prone to a remote denial-of-service vulnerability. Openswan 2.6.40 and prior are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201411-0042", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openswan", "scope": "eq", "trust": 1.4, "vendor": "openswan", "version": "2.6.40" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.40" }, { "model": "openswan", "scope": "eq", "trust": 0.6, "vendor": "openswan", "version": "2.6.25/2.6.26/2.6.27/2.6.28" }, { "model": "openswan", "scope": "eq", "trust": 0.6, "vendor": "openswan", "version": "2.6.29-2.6.37" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.37" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.22" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.21" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.20" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.16" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.36" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.35" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.33" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.29" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.28" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.27" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.26" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.25" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-01142" }, { "db": "BID", "id": "65629" }, { "db": "JVNDB", "id": "JVNDB-2014-005646" }, { "db": "NVD", "id": "CVE-2014-2037" }, { "db": "CNNVD", "id": "CNNVD-201411-450" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-2037" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Paul Wouters", "sources": [ { "db": "BID", "id": "65629" }, { "db": "CNNVD", "id": "CNNVD-201411-450" } ], "trust": 0.9 }, "cve": "CVE-2014-2037", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2014-2037", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2014-01142", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-2037", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2014-01142", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201411-450", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-01142" }, { "db": "JVNDB", "id": "JVNDB-2014-005646" }, { "db": "NVD", "id": "CVE-2014-2037" }, { "db": "CNNVD", "id": "CNNVD-201411-450" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466. Openswan is a VPN implemented using ipsec technology. Openswan is prone to a remote denial-of-service vulnerability. \nOpenswan 2.6.40 and prior are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2014-2037" }, { "db": "JVNDB", "id": "JVNDB-2014-005646" }, { "db": "CNVD", "id": "CNVD-2014-01142" }, { "db": "BID", "id": "65629" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-2037", "trust": 3.3 }, { "db": "BID", "id": "65629", "trust": 2.5 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2014/02/18/1", "trust": 1.6 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2014/02/20/2", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2014-005646", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2014-01142", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201411-450", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-01142" }, { "db": "BID", "id": "65629" }, { "db": "JVNDB", "id": "JVNDB-2014-005646" }, { "db": "NVD", "id": "CVE-2014-2037" }, { "db": "CNNVD", "id": "CNNVD-201411-450" } ] }, "id": "VAR-201411-0042", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-01142" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-01142" } ] }, "last_update_date": "2023-12-18T12:07:49.209000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Openswan 2.6.41 released", "trust": 0.8, "url": "https://lists.openswan.org/pipermail/users/2014-february/022898.html" }, { "title": "Openswan IKEv2 Payloads Incomplete Fix Remote Denial of Service Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/43764" }, { "title": "openswan-2.6.41", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=52570" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-01142" }, { "db": "JVNDB", "id": "JVNDB-2014-005646" }, { "db": "CNNVD", "id": "CNNVD-201411-450" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-005646" }, { "db": "NVD", "id": "CVE-2014-2037" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://www.securityfocus.com/bid/65629" }, { "trust": 1.6, "url": "http://www.openwall.com/lists/oss-security/2014/02/18/1" }, { "trust": 1.6, "url": "http://www.openwall.com/lists/oss-security/2014/02/20/2" }, { "trust": 1.6, "url": "https://lists.openswan.org/pipermail/users/2014-february/022898.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2037" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2037" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-01142" }, { "db": "JVNDB", "id": "JVNDB-2014-005646" }, { "db": "NVD", "id": "CVE-2014-2037" }, { "db": "CNNVD", "id": "CNNVD-201411-450" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-01142" }, { "db": "BID", "id": "65629" }, { "db": "JVNDB", "id": "JVNDB-2014-005646" }, { "db": "NVD", "id": "CVE-2014-2037" }, { "db": "CNNVD", "id": "CNNVD-201411-450" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-02-21T00:00:00", "db": "CNVD", "id": "CNVD-2014-01142" }, { "date": "2014-02-18T00:00:00", "db": "BID", "id": "65629" }, { "date": "2014-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005646" }, { "date": "2014-11-26T15:59:00.090000", "db": "NVD", "id": "CVE-2014-2037" }, { "date": "2014-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201411-450" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-02-24T00:00:00", "db": "CNVD", "id": "CNVD-2014-01142" }, { "date": "2014-11-25T00:55:00", "db": "BID", "id": "65629" }, { "date": "2014-11-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005646" }, { "date": "2019-07-29T13:26:45.483000", "db": "NVD", "id": "CVE-2014-2037" }, { "date": "2019-07-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201411-450" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201411-450" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Openswan IKEv2 Payloads Incomplete Fix Remote Denial of Service Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2014-01142" }, { "db": "BID", "id": "65629" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201411-450" } ], "trust": 0.6 } }
var-201401-0259
Vulnerability from variot
Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. Openswan is a VPN implemented using ipsec technology. Openswan is prone to a remote denial-of-service vulnerability. An attacker may exploit this issue to restart the application, resulting in a denial-of-service condition to legitimate users. Openswan 2.6.39 and prior are vulnerable.
CVE-2013-2053
During an audit of Libreswan (with which Openswan shares some code),
Florian Weimer found a remote buffer overflow in the atodn()
function. This vulnerability can be triggered when Opportunistic
Encryption (OE) is enabled and an attacker controls the PTR record
of a peer IP address.
Authentication is not needed to trigger the vulnerability.
CVE-2013-6466
Iustina Melinte found a vulnerability in Libreswan which also
applies to the Openswan code. By carefuly crafting IKEv2 packets, an
attacker can make the pluto daemon derefeences non-received IKEv2
payload, leading to the daemon crash.
Authentication is not needed to trigger the vulnerability.
Patches were originally written to fix the vulnerabilities in Libreswan, and have been ported to Openswan by Paul Wouters from the Libreswan Project.
Since the Openswan package is not maintained anymore in the Debian distribution and is not available in testing and unstable suites, it is recommended for IKE/IPsec users to switch to a supported implementation like strongSwan.
For the oldstable distribution (squeeze), these problems have been fixed in version 2.6.28+dfsg-5+squeeze2.
For the stable distribution (wheezy), these problems have been fixed in version 2.6.37-3.1.
We recommend that you upgrade your openswan packages. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: openswan security update Advisory ID: RHSA-2014:0185-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0185.html Issue date: 2014-02-18 CVE Names: CVE-2013-6466 =====================================================================
- Summary:
Updated openswan packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
Openswan is a free implementation of Internet Protocol Security (IPsec) and Internet Key Exchange (IKE). IPsec uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks. (CVE-2013-6466)
All openswan users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1050277 - CVE-2013-6466 openswan: dereferencing missing IKEv2 payloads causes pluto daemon to restart
- Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/openswan-2.6.32-7.3.el5_10.src.rpm
i386: openswan-2.6.32-7.3.el5_10.i386.rpm openswan-debuginfo-2.6.32-7.3.el5_10.i386.rpm openswan-doc-2.6.32-7.3.el5_10.i386.rpm
x86_64: openswan-2.6.32-7.3.el5_10.x86_64.rpm openswan-debuginfo-2.6.32-7.3.el5_10.x86_64.rpm openswan-doc-2.6.32-7.3.el5_10.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/openswan-2.6.32-7.3.el5_10.src.rpm
i386: openswan-2.6.32-7.3.el5_10.i386.rpm openswan-debuginfo-2.6.32-7.3.el5_10.i386.rpm openswan-doc-2.6.32-7.3.el5_10.i386.rpm
ia64: openswan-2.6.32-7.3.el5_10.ia64.rpm openswan-debuginfo-2.6.32-7.3.el5_10.ia64.rpm openswan-doc-2.6.32-7.3.el5_10.ia64.rpm
ppc: openswan-2.6.32-7.3.el5_10.ppc.rpm openswan-debuginfo-2.6.32-7.3.el5_10.ppc.rpm openswan-doc-2.6.32-7.3.el5_10.ppc.rpm
s390x: openswan-2.6.32-7.3.el5_10.s390x.rpm openswan-debuginfo-2.6.32-7.3.el5_10.s390x.rpm openswan-doc-2.6.32-7.3.el5_10.s390x.rpm
x86_64: openswan-2.6.32-7.3.el5_10.x86_64.rpm openswan-debuginfo-2.6.32-7.3.el5_10.x86_64.rpm openswan-doc-2.6.32-7.3.el5_10.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm
i386: openswan-2.6.32-27.2.el6_5.i686.rpm openswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm
x86_64: openswan-2.6.32-27.2.el6_5.x86_64.rpm openswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm
i386: openswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm openswan-doc-2.6.32-27.2.el6_5.i686.rpm
x86_64: openswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm openswan-doc-2.6.32-27.2.el6_5.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm
i386: openswan-2.6.32-27.2.el6_5.i686.rpm openswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm
ppc64: openswan-2.6.32-27.2.el6_5.ppc64.rpm openswan-debuginfo-2.6.32-27.2.el6_5.ppc64.rpm
s390x: openswan-2.6.32-27.2.el6_5.s390x.rpm openswan-debuginfo-2.6.32-27.2.el6_5.s390x.rpm
x86_64: openswan-2.6.32-27.2.el6_5.x86_64.rpm openswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm
i386: openswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm openswan-doc-2.6.32-27.2.el6_5.i686.rpm
ppc64: openswan-debuginfo-2.6.32-27.2.el6_5.ppc64.rpm openswan-doc-2.6.32-27.2.el6_5.ppc64.rpm
s390x: openswan-debuginfo-2.6.32-27.2.el6_5.s390x.rpm openswan-doc-2.6.32-27.2.el6_5.s390x.rpm
x86_64: openswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm openswan-doc-2.6.32-27.2.el6_5.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm
i386: openswan-2.6.32-27.2.el6_5.i686.rpm openswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm
x86_64: openswan-2.6.32-27.2.el6_5.x86_64.rpm openswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm
i386: openswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm openswan-doc-2.6.32-27.2.el6_5.i686.rpm
x86_64: openswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm openswan-doc-2.6.32-27.2.el6_5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2013-6466.html https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFTA6D7XlSAg2UNWIIRAkO0AKCCIbfDJPZuuXS7U6rZU8/CimQlxwCeIPUb dpyjtxp6hcgn2NES8FPSOkw= =jFWA -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
Background
Openswan is an implementation of IPsec for Linux.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/openswan <= 2.6.39-r1 Vulnerable! ------------------------------------------------------------------- NOTE: Certain packages are still vulnerable. Users should migrate to another package if one is available or wait for the existing packages to be marked stable by their architecture maintainers.
Impact
A remote attacker could create a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
Gentoo has discontinued support for Openswan. We recommend that users unmerge Openswan:
# emerge --unmerge "net-misc/openswan"
NOTE: The Gentoo developer(s) maintaining Openswan have discontinued support at this time. It may be possible that a new Gentoo developer will update Openswan at a later date. Alternatives packages such as Libreswan and strongSwan are currently available in Gentoo Portage.
References
[ 1 ] CVE-2013-6466 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6466
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-07.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201401-0259", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.12" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.10" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.11" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.02" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.17" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.1" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.12" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.24" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.29" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.36" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.10" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.3" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.8" }, { "model": "openswan", "scope": "lte", "trust": 1.0, "vendor": "xelerance", "version": "2.6.39" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.01" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.9" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.16" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.22" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.0" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.05" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.02" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.06" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.33" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.08" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.04" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.37" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.20" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.13" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.32" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.18" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.19" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.35" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.01" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.11" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.15" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.4" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.21" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.25" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.11" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.7" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.14" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.16" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.14" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.6" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.0" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.07" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.09" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.15" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.13" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.07" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.17" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.2" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.04" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.34" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.4.5" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.18" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.05" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.3.0" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.03" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.38" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.30" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.27" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.09" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.3.1" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.03" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.31" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.26" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.10" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.08" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.12" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.13" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.23" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.6.28" }, { "model": "openswan", "scope": "eq", "trust": 1.0, "vendor": "xelerance", "version": "2.5.06" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.38" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.37" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.34" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.31" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.30" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.39" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.36" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.35" }, { "model": "openswan", "scope": "eq", "trust": 0.9, "vendor": "openswan", "version": "2.6.33" }, { "model": "openswan", "scope": "lte", "trust": 0.8, "vendor": "openswan", "version": "2.6.39" }, { "model": "openswan", "scope": "eq", "trust": 0.6, "vendor": "openswan", "version": "3.7" }, { "model": "openswan", "scope": "eq", "trust": 0.6, "vendor": "openswan", "version": "2.6.32" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "contact fl mguard smart2 vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard smart2 vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard smart2", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard smart2", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs4004 tx/dtx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs4004 tx/dtx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs4004 tx/dtx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs4004 tx/dtx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs4000 tx/tx-p", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs4000 tx/tx-p", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs4000 tx/tx vpn-m", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs4000 tx/tx vpn-m", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs4000 tx/tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs4000 tx/tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs4000 tx/tx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs4000 tx/tx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs2005 tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs2005 tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs2000 tx/tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs2000 tx/tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs vpn analog", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs vpn analog", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard rs", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard rs", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard pcie4000 vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard pcie4000 vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard pci4000 vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard pci4000 vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard pci4000", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard pci4000", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard gt/gt vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard gt/gt vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard gt/gt", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard gt/gt", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard delta tx/tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard delta tx/tx vpn", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard delta tx/tx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard delta tx/tx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "contact fl mguard centerport", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.5.1" }, { "model": "contact fl mguard centerport", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "8.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.24" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.23" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.22" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.21" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.20" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.19" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.18" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.17" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.16" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.15" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.14" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.2" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.29" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.28" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.27" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.26" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.25" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.13" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.12" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.11" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.10" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.09" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.08" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.07" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.06" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.05" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.04" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.03" }, { "model": "openswan", "scope": "eq", "trust": 0.3, "vendor": "openswan", "version": "2.6.01" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "contact fl mguard smart2 vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard smart2", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs4004 tx/dtx vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs4004 tx/dtx", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs4000 tx/tx-p", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs4000 tx/tx vpn-m", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs4000 tx/tx vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs4000 tx/tx", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs2005 tx vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs2000 tx/tx vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs vpn analog", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard rs", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard pcie4000 vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard pci4000 vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard pci4000", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard gt/gt vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard gt/gt", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard delta tx/tx vpn", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard delta tx/tx", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" }, { "model": "contact fl mguard centerport", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "8.5.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00690" }, { "db": "BID", "id": "65155" }, { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "NVD", "id": "CVE-2013-6466" }, { "db": "CNNVD", "id": "CNNVD-201401-547" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.39", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-6466" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Iustina Melinte", "sources": [ { "db": "BID", "id": "65155" } ], "trust": 0.3 }, "cve": "CVE-2013-6466", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2013-6466", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2014-00690", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-6466", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2014-00690", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201401-547", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00690" }, { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "NVD", "id": "CVE-2013-6466" }, { "db": "CNNVD", "id": "CNNVD-201401-547" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. Openswan is a VPN implemented using ipsec technology. Openswan is prone to a remote denial-of-service vulnerability. \nAn attacker may exploit this issue to restart the application, resulting in a denial-of-service condition to legitimate users. \nOpenswan 2.6.39 and prior are vulnerable. \n\nCVE-2013-2053\n\n During an audit of Libreswan (with which Openswan shares some code),\n Florian Weimer found a remote buffer overflow in the atodn()\n function. This vulnerability can be triggered when Opportunistic\n Encryption (OE) is enabled and an attacker controls the PTR record\n of a peer IP address. \n Authentication is not needed to trigger the vulnerability. \n\nCVE-2013-6466\n\n Iustina Melinte found a vulnerability in Libreswan which also\n applies to the Openswan code. By carefuly crafting IKEv2 packets, an\n attacker can make the pluto daemon derefeences non-received IKEv2\n payload, leading to the daemon crash. \n Authentication is not needed to trigger the vulnerability. \n\nPatches were originally written to fix the vulnerabilities in Libreswan,\nand have been ported to Openswan by Paul Wouters from the Libreswan\nProject. \n\nSince the Openswan package is not maintained anymore in the Debian\ndistribution and is not available in testing and unstable suites, it is\nrecommended for IKE/IPsec users to switch to a supported implementation\nlike strongSwan. \n\nFor the oldstable distribution (squeeze), these problems have been fixed in\nversion 2.6.28+dfsg-5+squeeze2. \n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 2.6.37-3.1. \n\nWe recommend that you upgrade your openswan packages. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: openswan security update\nAdvisory ID: RHSA-2014:0185-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2014-0185.html\nIssue date: 2014-02-18\nCVE Names: CVE-2013-6466 \n=====================================================================\n\n1. Summary:\n\nUpdated openswan packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5 and 6. \n\nThe Red Hat Security Response Team has rated this update as having Moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nOpenswan is a free implementation of Internet Protocol Security (IPsec) and\nInternet Key Exchange (IKE). IPsec uses strong cryptography to provide both\nauthentication and encryption services. These services allow you to build\nsecure tunnels through untrusted networks. (CVE-2013-6466)\n\nAll openswan users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1050277 - CVE-2013-6466 openswan: dereferencing missing IKEv2 payloads causes pluto daemon to restart\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/openswan-2.6.32-7.3.el5_10.src.rpm\n\ni386:\nopenswan-2.6.32-7.3.el5_10.i386.rpm\nopenswan-debuginfo-2.6.32-7.3.el5_10.i386.rpm\nopenswan-doc-2.6.32-7.3.el5_10.i386.rpm\n\nx86_64:\nopenswan-2.6.32-7.3.el5_10.x86_64.rpm\nopenswan-debuginfo-2.6.32-7.3.el5_10.x86_64.rpm\nopenswan-doc-2.6.32-7.3.el5_10.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/openswan-2.6.32-7.3.el5_10.src.rpm\n\ni386:\nopenswan-2.6.32-7.3.el5_10.i386.rpm\nopenswan-debuginfo-2.6.32-7.3.el5_10.i386.rpm\nopenswan-doc-2.6.32-7.3.el5_10.i386.rpm\n\nia64:\nopenswan-2.6.32-7.3.el5_10.ia64.rpm\nopenswan-debuginfo-2.6.32-7.3.el5_10.ia64.rpm\nopenswan-doc-2.6.32-7.3.el5_10.ia64.rpm\n\nppc:\nopenswan-2.6.32-7.3.el5_10.ppc.rpm\nopenswan-debuginfo-2.6.32-7.3.el5_10.ppc.rpm\nopenswan-doc-2.6.32-7.3.el5_10.ppc.rpm\n\ns390x:\nopenswan-2.6.32-7.3.el5_10.s390x.rpm\nopenswan-debuginfo-2.6.32-7.3.el5_10.s390x.rpm\nopenswan-doc-2.6.32-7.3.el5_10.s390x.rpm\n\nx86_64:\nopenswan-2.6.32-7.3.el5_10.x86_64.rpm\nopenswan-debuginfo-2.6.32-7.3.el5_10.x86_64.rpm\nopenswan-doc-2.6.32-7.3.el5_10.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm\n\ni386:\nopenswan-2.6.32-27.2.el6_5.i686.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm\n\nx86_64:\nopenswan-2.6.32-27.2.el6_5.x86_64.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm\n\ni386:\nopenswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm\nopenswan-doc-2.6.32-27.2.el6_5.i686.rpm\n\nx86_64:\nopenswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm\nopenswan-doc-2.6.32-27.2.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm\n\ni386:\nopenswan-2.6.32-27.2.el6_5.i686.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm\n\nppc64:\nopenswan-2.6.32-27.2.el6_5.ppc64.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.ppc64.rpm\n\ns390x:\nopenswan-2.6.32-27.2.el6_5.s390x.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.s390x.rpm\n\nx86_64:\nopenswan-2.6.32-27.2.el6_5.x86_64.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm\n\ni386:\nopenswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm\nopenswan-doc-2.6.32-27.2.el6_5.i686.rpm\n\nppc64:\nopenswan-debuginfo-2.6.32-27.2.el6_5.ppc64.rpm\nopenswan-doc-2.6.32-27.2.el6_5.ppc64.rpm\n\ns390x:\nopenswan-debuginfo-2.6.32-27.2.el6_5.s390x.rpm\nopenswan-doc-2.6.32-27.2.el6_5.s390x.rpm\n\nx86_64:\nopenswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm\nopenswan-doc-2.6.32-27.2.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm\n\ni386:\nopenswan-2.6.32-27.2.el6_5.i686.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm\n\nx86_64:\nopenswan-2.6.32-27.2.el6_5.x86_64.rpm\nopenswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openswan-2.6.32-27.2.el6_5.src.rpm\n\ni386:\nopenswan-debuginfo-2.6.32-27.2.el6_5.i686.rpm\nopenswan-doc-2.6.32-27.2.el6_5.i686.rpm\n\nx86_64:\nopenswan-debuginfo-2.6.32-27.2.el6_5.x86_64.rpm\nopenswan-doc-2.6.32-27.2.el6_5.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2013-6466.html\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFTA6D7XlSAg2UNWIIRAkO0AKCCIbfDJPZuuXS7U6rZU8/CimQlxwCeIPUb\ndpyjtxp6hcgn2NES8FPSOkw=\n=jFWA\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nBackground\n==========\n\nOpenswan is an implementation of IPsec for Linux. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/openswan \u003c= 2.6.39-r1 Vulnerable!\n -------------------------------------------------------------------\n NOTE: Certain packages are still vulnerable. Users should migrate\n to another package if one is available or wait for the\n existing packages to be marked stable by their\n architecture maintainers. \n\nImpact\n======\n\nA remote attacker could create a Denial of Service condition. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nGentoo has discontinued support for Openswan. We recommend that users\nunmerge Openswan:\n\n # emerge --unmerge \"net-misc/openswan\"\n\nNOTE: The Gentoo developer(s) maintaining Openswan have discontinued\nsupport at this time. It may be possible that a new Gentoo developer\nwill update Openswan at a later date. Alternatives packages such as\nLibreswan and strongSwan are currently available in Gentoo Portage. \n\nReferences\n==========\n\n[ 1 ] CVE-2013-6466\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6466\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201411-07.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n", "sources": [ { "db": "NVD", "id": "CVE-2013-6466" }, { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "CNVD", "id": "CNVD-2014-00690" }, { "db": "BID", "id": "65155" }, { "db": "PACKETSTORM", "id": "125973" }, { "db": "PACKETSTORM", "id": "125264" }, { "db": "PACKETSTORM", "id": "129235" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-6466", "trust": 3.6 }, { "db": "BID", "id": "65155", "trust": 2.5 }, { "db": "CERT@VDE", "id": "VDE-2017-001", "trust": 1.6 }, { "db": "ICS CERT", "id": "ICSA-17-250-02", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2013-005932", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2014-00690", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201401-547", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "125973", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "125264", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129235", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00690" }, { "db": "BID", "id": "65155" }, { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "PACKETSTORM", "id": "125973" }, { "db": "PACKETSTORM", "id": "125264" }, { "db": "PACKETSTORM", "id": "129235" }, { "db": "NVD", "id": "CVE-2013-6466" }, { "db": "CNNVD", "id": "CNNVD-201401-547" } ] }, "id": "VAR-201401-0259", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-00690" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00690" } ] }, "last_update_date": "2023-12-18T11:06:24.720000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2013-6467 Libreswan dereferencing missing IKEv2 payloads causes restart", "trust": 0.8, "url": "https://libreswan.org/security/cve-2013-6467/cve-2013-6467.txt" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.openswan.org/" }, { "title": "RHSA-2014:0185", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2014-0185.html" }, { "title": "Patch for Openswan IKEv2 Load Remote Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/43206" }, { "title": "openswan-latest", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=47728" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00690" }, { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "CNNVD", "id": "CNNVD-201401-547" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "NVD", "id": "CVE-2013-6466" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://libreswan.org/security/cve-2013-6467/cve-2013-6467.txt" }, { "trust": 1.7, "url": "http://rhn.redhat.com/errata/rhsa-2014-0185.html" }, { "trust": 1.6, "url": "http://www.debian.org/security/2014/dsa-2893" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/65155" }, { "trust": 1.6, "url": "https://cert.vde.com/en-us/advisories/vde-2017-001" }, { "trust": 1.6, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90524" }, { "trust": 1.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-250-02" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6466" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6466" }, { "trust": 0.3, "url": "http://www.openswan.org/" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100178570" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6466" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2053" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://access.redhat.com/site/articles/11258" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-6466.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6466" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201411-07.xml" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-00690" }, { "db": "BID", "id": "65155" }, { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "PACKETSTORM", "id": "125973" }, { "db": "PACKETSTORM", "id": "125264" }, { "db": "PACKETSTORM", "id": "129235" }, { "db": "NVD", "id": "CVE-2013-6466" }, { "db": "CNNVD", "id": "CNNVD-201401-547" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-00690" }, { "db": "BID", "id": "65155" }, { "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "db": "PACKETSTORM", "id": "125973" }, { "db": "PACKETSTORM", "id": "125264" }, { "db": "PACKETSTORM", "id": "129235" }, { "db": "NVD", "id": "CVE-2013-6466" }, { "db": "CNNVD", "id": "CNNVD-201401-547" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-01-29T00:00:00", "db": "CNVD", "id": "CNVD-2014-00690" }, { "date": "2014-01-27T00:00:00", "db": "BID", "id": "65155" }, { "date": "2014-01-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "date": "2014-04-01T19:02:00", "db": "PACKETSTORM", "id": "125973" }, { "date": "2014-02-19T02:48:29", "db": "PACKETSTORM", "id": "125264" }, { "date": "2014-11-24T13:32:00", "db": "PACKETSTORM", "id": "129235" }, { "date": "2014-01-26T20:55:05.330000", "db": "NVD", "id": "CVE-2013-6466" }, { "date": "2014-01-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201401-547" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-02-13T00:00:00", "db": "CNVD", "id": "CNVD-2014-00690" }, { "date": "2017-09-08T13:13:00", "db": "BID", "id": "65155" }, { "date": "2017-09-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005932" }, { "date": "2019-07-29T14:24:46.720000", "db": "NVD", "id": "CVE-2013-6466" }, { "date": "2019-07-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201401-547" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "125264" }, { "db": "PACKETSTORM", "id": "129235" }, { "db": "CNNVD", "id": "CNNVD-201401-547" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Openswan Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005932" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201401-547" } ], "trust": 0.6 } }