Unrated severityNVD Advisory· Published Aug 20, 2010· Updated Apr 29, 2026
CVE-2010-2628
CVE-2010-2628
Description
The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.
Affected products
8cpe:2.3:a:strongswan:strongswan:4.3.0:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:a:strongswan:strongswan:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.4.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- download.strongswan.org/patches/08_snprintf_patch/strongswan-4.3.3_snprintf.patchnvdPatch
- download.strongswan.org/patches/08_snprintf_patch/strongswan-4.3.4_snprintf.patchnvdPatch
- download.strongswan.org/patches/08_snprintf_patch/strongswan-4.3.5_snprintf.patchnvdPatch
- download.strongswan.org/patches/08_snprintf_patch/strongswan-4.3.6_snprintf.patchnvdPatch
- download.strongswan.org/patches/08_snprintf_patch/strongswan-4.4.0_snprintf.patchnvdPatch
- www.securityfocus.com/bid/42444nvdPatch
- www.vupen.com/english/advisories/2010/2085nvdPatchVendor Advisory
- lists.strongswan.org/pipermail/users/2010-August/005167.htmlnvdPatchVendor Advisory
- secunia.com/advisories/40956nvdVendor Advisory
- lists.opensuse.org/opensuse-updates/2010-08/msg00026.htmlnvd
- trac.strongswan.org/projects/strongswan/wiki/441nvd
- www.securitytracker.com/idnvd
- www.vupen.com/english/advisories/2010/2086nvd
- bugzilla.novell.com/615915nvd
News mentions
0No linked articles in our index yet.