CVE-2005-0162
Published Jan 26, 2005
Last updated 5 years ago
Overview
- Description
- Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openswan:openswan:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2411B8B-FE2A-4E99-A280-0FB39291E96F", "versionEndIncluding": "1.0.9" }, { "criteria": "cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39C5F91B-EE8A-4A81-A21D-68A3F4295200" } ], "operator": "OR" } ] } ]