This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
Two buffer overflow flaws were found in the Openswan client-side XAUTH
handling code used when connecting to certain Cisco gateways. A
malicious or compromised VPN gateway could use these flaws to execute
arbitrary code on the connecting Openswan client. (CVE-2010-3302,
Two input sanitization flaws were found in the Openswan client-side
handling of Cisco gateway banners. A malicious or compromised VPN
gateway could use these flaws to execute arbitrary code on the
connecting Openswan client. (CVE-2010-3752, CVE-2010-3753)
After installing this update, the ipsec service will be restarted
See also :
Update the affected openswan and / or openswan-doc packages.
Risk factor :
Medium / CVSS Base Score : 6.5
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 60900 ()
CVE ID: CVE-2010-3302CVE-2010-3308CVE-2010-3752CVE-2010-3753
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.