| Summary | Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions. |
|---|---|
| Publication Date | Nov. 18, 2011, 4:55 a.m. |
| Registration Date | Jan. 28, 2021, 4:39 p.m. |
| Last Update | Nov. 21, 2024, 10:31 a.m. |
| CVSS2.0 : MEDIUM | |
| Score | 4.0 |
|---|---|
| Vector | AV:N/AC:L/Au:S/C:N/I:N/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 単一 |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:* | |||||
| Title | Openswan におけるサービス運用妨害 (DoS) の脆弱性 |
|---|---|
| Summary | Openswan の cryptographic helper handler 機能は、(1) quick_outI1_continue および (2) quick_outI1 関数に関する処理に不備があるため、サービス運用妨害 (pluto IKE デーモンクラッシュ) 状態となる脆弱性が存在します。 |
| Possible impacts | 第三者により、サービス運用妨害 (pluto IKE デーモンクラッシュ) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Oct. 28, 2011, midnight |
| Registration Date | Nov. 21, 2011, 4:04 p.m. |
| Last Update | Jan. 13, 2012, 6:10 p.m. |
| レッドハット |
| Red Hat Enterprise Linux 5 (server) |
| Red Hat Enterprise Linux Desktop 5.0 (client) |
| Red Hat Enterprise Linux Desktop 6 |
| Red Hat Enterprise Linux Server 6 |
| Red Hat Enterprise Linux Server EUS 6.1.z |
| Red Hat Enterprise Linux Workstation 6 |
| Openswan |
| Openswan 2.3.0 から 2.6.36 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2011年11月21日] 掲載 [2012年01月13日] CVSS による深刻度:基本値と攻撃前の認証要否を変更 |
Feb. 17, 2018, 10:37 a.m. |