CVE-2010-0392
Published Jan 26, 2010
Last updated 9 months ago
Overview
- Description
- Stack-based buffer overflow in vpnconf.exe in TheGreenBow IPSec VPN Client 4.51.001, 4.65.003, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a long OpenScriptAfterUp parameter in a policy (.tgb) file, related to "phase 2."
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:thegreenbow:ipsec_vpn_client:4.51.001:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71DAEFED-8BD7-4F16-B1CE-E512B56EA06B" }, { "criteria": "cpe:2.3:a:thegreenbow:ipsec_vpn_client:4.65.003:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E52149D2-DE21-4BC4-AFA9-3852DE80664A" } ], "operator": "OR" } ] } ]