CVE-2010-3302
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
05/10/2010
Last modified:
11/04/2025
Description
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a packet.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html
- http://secunia.com/advisories/41769
- http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt
- http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch
- http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch
- http://www.redhat.com/support/errata/RHSA-2010-0892.html
- http://www.securityfocus.com/bid/43588
- http://www.securitytracker.com/id?1024749=
- http://www.vupen.com/english/advisories/2010/2526
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html
- http://secunia.com/advisories/41769
- http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt
- http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch
- http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch
- http://www.redhat.com/support/errata/RHSA-2010-0892.html
- http://www.securityfocus.com/bid/43588
- http://www.securitytracker.com/id?1024749=
- http://www.vupen.com/english/advisories/2010/2526



