Lucene search

K
nvd[email protected]NVD:CVE-2011-4073
HistoryNov 17, 2011 - 7:55 p.m.

CVE-2011-4073

2011-11-1719:55:01
CWE-399
web.nvd.nist.gov
4

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

AI Score

6

Confidence

Low

EPSS

0.01

Percentile

83.9%

Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions.

Affected configurations

Nvd
Node
xeleranceopenswanMatch2.3.0
OR
xeleranceopenswanMatch2.3.1
OR
xeleranceopenswanMatch2.4.0
OR
xeleranceopenswanMatch2.4.1
OR
xeleranceopenswanMatch2.4.2
OR
xeleranceopenswanMatch2.4.3
OR
xeleranceopenswanMatch2.4.4
OR
xeleranceopenswanMatch2.4.5
OR
xeleranceopenswanMatch2.4.6
OR
xeleranceopenswanMatch2.4.7
OR
xeleranceopenswanMatch2.4.8
OR
xeleranceopenswanMatch2.4.9
OR
xeleranceopenswanMatch2.4.10
OR
xeleranceopenswanMatch2.4.11
OR
xeleranceopenswanMatch2.4.12
OR
xeleranceopenswanMatch2.4.13
OR
xeleranceopenswanMatch2.5.0
OR
xeleranceopenswanMatch2.5.0sbs4
OR
xeleranceopenswanMatch2.5.0sbs5
OR
xeleranceopenswanMatch2.5.01
OR
xeleranceopenswanMatch2.5.02
OR
xeleranceopenswanMatch2.5.03
OR
xeleranceopenswanMatch2.5.04
OR
xeleranceopenswanMatch2.5.05
OR
xeleranceopenswanMatch2.5.06
OR
xeleranceopenswanMatch2.5.07
OR
xeleranceopenswanMatch2.5.08
OR
xeleranceopenswanMatch2.5.09
OR
xeleranceopenswanMatch2.5.10
OR
xeleranceopenswanMatch2.5.11
OR
xeleranceopenswanMatch2.5.12
OR
xeleranceopenswanMatch2.5.13
OR
xeleranceopenswanMatch2.5.14
OR
xeleranceopenswanMatch2.5.15
OR
xeleranceopenswanMatch2.5.16
OR
xeleranceopenswanMatch2.5.17
OR
xeleranceopenswanMatch2.5.18
OR
xeleranceopenswanMatch2.6.01
OR
xeleranceopenswanMatch2.6.02
OR
xeleranceopenswanMatch2.6.03
OR
xeleranceopenswanMatch2.6.04
OR
xeleranceopenswanMatch2.6.05
OR
xeleranceopenswanMatch2.6.06
OR
xeleranceopenswanMatch2.6.07
OR
xeleranceopenswanMatch2.6.08
OR
xeleranceopenswanMatch2.6.09
OR
xeleranceopenswanMatch2.6.10
OR
xeleranceopenswanMatch2.6.11
OR
xeleranceopenswanMatch2.6.12
OR
xeleranceopenswanMatch2.6.13
OR
xeleranceopenswanMatch2.6.14
OR
xeleranceopenswanMatch2.6.15
OR
xeleranceopenswanMatch2.6.16
OR
xeleranceopenswanMatch2.6.17
OR
xeleranceopenswanMatch2.6.18
OR
xeleranceopenswanMatch2.6.19
OR
xeleranceopenswanMatch2.6.20
OR
xeleranceopenswanMatch2.6.21
OR
xeleranceopenswanMatch2.6.22
OR
xeleranceopenswanMatch2.6.23
OR
xeleranceopenswanMatch2.6.24
OR
xeleranceopenswanMatch2.6.25
OR
xeleranceopenswanMatch2.6.26
OR
xeleranceopenswanMatch2.6.27
OR
xeleranceopenswanMatch2.6.28
OR
xeleranceopenswanMatch2.6.29
OR
xeleranceopenswanMatch2.6.30
OR
xeleranceopenswanMatch2.6.31
OR
xeleranceopenswanMatch2.6.32
OR
xeleranceopenswanMatch2.6.33
OR
xeleranceopenswanMatch2.6.34
OR
xeleranceopenswanMatch2.6.35
OR
xeleranceopenswanMatch2.6.36
VendorProductVersionCPE
xeleranceopenswan2.3.0cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*
xeleranceopenswan2.3.1cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*
xeleranceopenswan2.4.0cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*
xeleranceopenswan2.4.1cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*
xeleranceopenswan2.4.2cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*
xeleranceopenswan2.4.3cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*
xeleranceopenswan2.4.4cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*
xeleranceopenswan2.4.5cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*
xeleranceopenswan2.4.6cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*
xeleranceopenswan2.4.7cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*
Rows per page:
1-10 of 731

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

AI Score

6

Confidence

Low

EPSS

0.01

Percentile

83.9%