Rene Mayrhofer wrote:
> Hi Joey,
>
> On Friday 28 January 2005 07:28, Martin Schulze wrote:
> > Stack-based buffer overflow in the get_internal_addresses function in
> > the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x
> > before 2.3.0, when compiled XAUTH and PAM enabled, all
Hi Joey,
On Friday 28 January 2005 07:28, Martin Schulze wrote:
> Stack-based buffer overflow in the get_internal_addresses function in
> the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x
> before 2.3.0, when compiled XAUTH and PAM enabled, allows remote
> authenticated attacke
==
Candidate: CAN-2005-0162
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0162
Reference: IDEFENSE:20050126 Openswan XAUTH/PAM Buffer Overflow Vulnerability
Reference:
URL:http://www.idefense.com/application/poi/display?id=190&type
3 matches
Mail list logo