CVE-2011-2147
- EPSS 0.04%
- Veröffentlicht 20.05.2011 22:55:05
- Zuletzt bearbeitet 11.04.2025 00:51:21
Openswan 2.2.x does not properly restrict permissions for (1) /var/run/starter.pid, related to starter.c in the IPsec starter, and (2) /var/lock/subsys/ipsec, which allows local users to kill arbitrary processes by writing a PID to a file, or possibl...
CVE-2008-4190
- EPSS 0.15%
- Veröffentlicht 24.09.2008 11:42:25
- Zuletzt bearbeitet 09.04.2025 00:30:58
The IPSEC livetest tool in Openswan 2.4.12 and earlier, and 2.6.x through 2.6.16, allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack on the (1) ipseclive.conn and (2) ipsec.olts.remote.log temporary files....
CVE-2005-3671
- EPSS 6.72%
- Veröffentlicht 18.11.2005 21:03:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an...
CVE-2005-0162
- EPSS 4.3%
- Veröffentlicht 26.01.2005 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbit...
- EPSS 0.58%
- Veröffentlicht 06.12.2004 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
FreeS/WAN 1.x and 2.x, and other related products including superfreeswan 1.x, openswan 1.x before 1.0.6, openswan 2.x before 2.1.4, and strongSwan before 2.1.3, allows remote attackers to authenticate using spoofed PKCS#7 certificates in which a sel...