TheGreenBow VPN Client TGB File OpenScriptAfterUp Parameter Local Overflow

High Nessus Plugin ID 46784


The remote Windows host contains a VPN client that is affected by a stack-based buffer overflow vulnerability.


The remote Windows host contains TheGreenBow VPN client, an IPsec VPN client.

The installed version of TheGreenBow VPN Client is earlier than 4.65.003 or is an unpatched instance of 4.65.003. As such, it is reportedly affected by a local stack based buffer overflow caused by a boundary error when processing an overly long 'OpenScriptAfterUp' parameter of the 'tgb' policy file.

An attacker, exploiting this flaw, could potentially execute arbitrary code subject to the privileges of the user running the affected application.


Upgrade to TheGreenBow VPN client version if necessary and apply the patch referenced in the vendor's advisory.

See Also

Plugin Details

Severity: High

ID: 46784

File Name: thegreenbow_vpn_tgb_file_overflow.nasl

Version: $Revision: 1.8 $

Type: local

Agent: windows

Family: Windows

Published: 2010/06/02

Modified: 2016/11/03

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2010/01/20

Vulnerability Publication Date: 2010/01/20

Reference Information

CVE: CVE-2010-0392

BID: 40387

OSVDB: 61866

Secunia: 38262

CWE: 119