Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-3753

Опубликовано: 27 сент. 2010
Источник: redhat
CVSS2: 7.1
EPSS Низкий

Описание

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5openswanNot affected
Red Hat Enterprise Linux 6openswanFixedRHSA-2010:089216.11.2010

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=640715Openswan: Gateway arbitrary execution via shell metacharacters in the cisco_banner

EPSS

Процентиль: 70%
0.00649
Низкий

7.1 High

CVSS2

Связанные уязвимости

ubuntu
больше 14 лет назад

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

nvd
больше 14 лет назад

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

debian
больше 14 лет назад

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 ...

github
около 3 лет назад

programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in the cisco_banner (aka server_banner) field, a different vulnerability than CVE-2010-3308.

oracle-oval
больше 14 лет назад

ELSA-2010-0892: openswan security update (MODERATE)

EPSS

Процентиль: 70%
0.00649
Низкий

7.1 High

CVSS2