CVE-2010-0392
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
26/01/2010
Last modified:
11/04/2025
Description
Stack-based buffer overflow in vpnconf.exe in TheGreenBow IPSec VPN Client 4.51.001, 4.65.003, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a long OpenScriptAfterUp parameter in a policy (.tgb) file, related to "phase 2."
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:thegreenbow:ipsec_vpn_client:4.51.001:*:*:*:*:*:*:* | ||
| cpe:2.3:a:thegreenbow:ipsec_vpn_client:4.65.003:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/61866
- http://secunia.com/advisories/38262
- http://www.securityfocus.com/archive/1/509091/100/0/threaded
- http://www.securityfocus.com/bid/40387
- http://www.senseofsecurity.com.au/advisories/SOS-10-001
- http://www.thegreenbow.com/download.php?id=1000150
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55793
- http://osvdb.org/61866
- http://secunia.com/advisories/38262
- http://www.securityfocus.com/archive/1/509091/100/0/threaded
- http://www.securityfocus.com/bid/40387
- http://www.senseofsecurity.com.au/advisories/SOS-10-001
- http://www.thegreenbow.com/download.php?id=1000150
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55793



