CVE-2011-2147
- EPSS 0.04%
- Veröffentlicht 20.05.2011 22:55:05
- Zuletzt bearbeitet 29.04.2026 01:13:23
Openswan 2.2.x does not properly restrict permissions for (1) /var/run/starter.pid, related to starter.c in the IPsec starter, and (2) /var/lock/subsys/ipsec, which allows local users to kill arbitrary processes by writing a PID to a file, or possibl...
CVE-2008-4190
- EPSS 0.17%
- Veröffentlicht 24.09.2008 11:42:25
- Zuletzt bearbeitet 23.04.2026 00:35:47
The IPSEC livetest tool in Openswan 2.4.12 and earlier, and 2.6.x through 2.6.16, allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack on the (1) ipseclive.conn and (2) ipsec.olts.remote.log temporary files....
CVE-2005-3671
- EPSS 6.72%
- Veröffentlicht 18.11.2005 21:03:00
- Zuletzt bearbeitet 16.04.2026 00:27:16
The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an...
CVE-2005-0162
- EPSS 4.3%
- Veröffentlicht 26.01.2005 05:00:00
- Zuletzt bearbeitet 16.04.2026 00:27:16
Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbit...
- EPSS 0.58%
- Veröffentlicht 06.12.2004 05:00:00
- Zuletzt bearbeitet 16.04.2026 00:27:16
FreeS/WAN 1.x and 2.x, and other related products including superfreeswan 1.x, openswan 1.x before 1.0.6, openswan 2.x before 2.1.4, and strongSwan before 2.1.3, allows remote attackers to authenticate using spoofed PKCS#7 certificates in which a sel...