CVE-2010-3752

critical

Description

programs/pluto/xauth.c in the client in Openswan 2.6.25 through 2.6.28 allows remote authenticated gateways to execute arbitrary commands via shell metacharacters in (1) cisco_dns_info or (2) cisco_domain_info data in a packet, a different vulnerability than CVE-2010-3302.

References

http://www.vupen.com/english/advisories/2010/2526

http://www.securitytracker.com/id?1024749

http://www.securityfocus.com/bid/43588

http://www.redhat.com/support/errata/RHSA-2010-0892.html

http://www.openswan.org/download/CVE-2010-3308/openswan-2.6.26-2.6.28-CVE-2010-330x.patch

http://www.openswan.org/download/CVE-2010-3302/openswan-2.6.25-CVE-2010-3302.patch

http://www.openswan.org/download/CVE-2010-3302/CVE-2010-3302.txt

Details

Source: Mitre, NVD

Published: 2010-10-05

Updated: 2019-07-29

Risk Information

CVSS v2

Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical