Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-0162

Опубликовано: 26 янв. 2005
Источник: ubuntu
Приоритет: medium
CVSS2: 7.2

Описание

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

РелизСтатусПримечание
dapper

not-affected

devel

released

2.4.6+dfsg.2-1.1build2
edgy

not-affected

feisty

not-affected

upstream

needs-triage

Показывать по

Ссылки на источники

7.2 High

CVSS2

Связанные уязвимости

nvd
около 21 года назад

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

debian
около 21 года назад

Stack-based buffer overflow in the get_internal_addresses function in ...

github
почти 4 года назад

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

7.2 High

CVSS2