Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-0162

Опубликовано: 26 янв. 2005
Источник: ubuntu
Приоритет: medium
CVSS2: 7.2

Описание

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

РелизСтатусПримечание
dapper

not-affected

devel

released

2.4.6+dfsg.2-1.1build2
edgy

not-affected

feisty

not-affected

upstream

needs-triage

Показывать по

Ссылки на источники

7.2 High

CVSS2

Связанные уязвимости

nvd
почти 21 год назад

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

debian
почти 21 год назад

Stack-based buffer overflow in the get_internal_addresses function in ...

github
больше 3 лет назад

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

7.2 High

CVSS2