Unrated severityNVD Advisory· Published Jan 26, 2005· Updated Apr 16, 2026
CVE-2005-0162
CVE-2005-0162
Description
Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- www.idefense.com/application/poi/displaynvdPatchVendor Advisory
- www.openswan.org/support/vuln/IDEF0785/nvdPatchVendor Advisory
- secunia.com/advisories/14038nvd
- secunia.com/advisories/14062nvd
- securitytracker.com/idnvd
- www.osvdb.org/13195nvd
- www.redhat.com/archives/fedora-announce-list/2005-January/msg00103.htmlnvd
- www.securityfocus.com/bid/12377nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/19078nvd
News mentions
0No linked articles in our index yet.