{ "schema_version": "1.4.0", "id": "GHSA-fmrf-vrjc-f4q9", "modified": "2022-05-14T00:55:33Z", "published": "2022-05-14T00:55:33Z", "aliases": [ "CVE-2010-3302" ], "details": "Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via long (1) cisco_dns_info or (2) cisco_domain_info data in a packet.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3302" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2010:0892" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2010-3302" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634264" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/048999.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049053.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049073.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/41769" }, { "type": "WEB", "url": "http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt" }, { "type": "WEB", "url": "http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch" }, { "type": "WEB", "url": "http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0892.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/43588" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1024749" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/2526" } ], "database_specific": { "cwe_ids": [ "CWE-119" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-10-05T22:00:00Z" } }