Unrated severityNVD Advisory· Published Jan 26, 2010· Updated Apr 29, 2026
CVE-2010-0392
CVE-2010-0392
Description
Stack-based buffer overflow in vpnconf.exe in TheGreenBow IPSec VPN Client 4.51.001, 4.65.003, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via a long OpenScriptAfterUp parameter in a policy (.tgb) file, related to "phase 2."
Affected products
2cpe:2.3:a:thegreenbow:ipsec_vpn_client:4.51.001:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:thegreenbow:ipsec_vpn_client:4.51.001:*:*:*:*:*:*:*
- cpe:2.3:a:thegreenbow:ipsec_vpn_client:4.65.003:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- www.senseofsecurity.com.au/advisories/SOS-10-001nvdPatchURL Repurposed
- www.thegreenbow.com/download.phpnvdPatch
- secunia.com/advisories/38262nvdVendor Advisory
- osvdb.org/61866nvd
- www.securityfocus.com/archive/1/509091/100/0/threadednvd
- www.securityfocus.com/bid/40387nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/55793nvd
News mentions
0No linked articles in our index yet.