CVE-2010-0392

Stack-based buffer overflow in vpnconf.exe in TheGreenBow IPSec VPN Client 4.51.001, 4.65.003, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a long OpenScriptAfterUp parameter in a policy (.tgb) file, related to "phase 2."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:thegreenbow:ipsec_vpn_client:4.51.001:*:*:*:*:*:*:*
cpe:2.3:a:thegreenbow:ipsec_vpn_client:4.65.003:*:*:*:*:*:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References () http://www.senseofsecurity.com.au/advisories/SOS-10-001 - Patch () http://www.senseofsecurity.com.au/advisories/SOS-10-001 - Patch, URL Repurposed

Information

Published : 2010-01-26 18:30

Updated : 2024-02-14 01:17


NVD link : CVE-2010-0392

Mitre link : CVE-2010-0392

CVE.ORG link : CVE-2010-0392


JSON object : View

Products Affected

thegreenbow

  • ipsec_vpn_client
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer