Lucene search

K
cve[email protected]CVE-2005-0162
HistoryJan 29, 2005 - 5:00 a.m.

CVE-2005-0162

2005-01-2905:00:00
web.nvd.nist.gov
30
cve-2005-0162
stack-based buffer overflow
pluto application
openswan
remote code execution
xauth
pam

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.6 High

AI Score

Confidence

High

0.02 Low

EPSS

Percentile

88.8%

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

Affected configurations

NVD
Node
openswanopenswanRange1.0.9
OR
xeleranceopenswanMatch2.3.0

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.6 High

AI Score

Confidence

High

0.02 Low

EPSS

Percentile

88.8%

Related for CVE-2005-0162