======================================================
Candidate: CAN-2005-0162
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0162

Reference: IDEFENSE:20050126 Openswan XAUTH/PAM Buffer Overflow Vulnerability
Reference: 
URL:http://www.idefense.com/application/poi/display?id=190&type=vulnerabilities

Stack-based buffer overflow in the get_internal_addresses function in
the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x
before 2.3.0, when compiled XAUTH and PAM enabled, allows remote
authenticated attackers to execute arbitrary code.

Please mention this id in the changelog (could be done with the next
upload if you've already uploaded the fixed package.

Regards,

        Joey

-- 
Testing? What's that? If it compiles, it is good, if it boots up, it is perfect.

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to