VYPR
Unrated severityNVD Advisory· Published Aug 20, 2010· Updated Apr 29, 2026

CVE-2010-2628

CVE-2010-2628

Description

The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.

Affected products

8
  • cpe:2.3:a:strongswan:strongswan:4.3.0:*:*:*:*:*:*:*+ 7 more
    • cpe:2.3:a:strongswan:strongswan:4.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:strongswan:strongswan:4.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:strongswan:strongswan:4.3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:strongswan:strongswan:4.3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:strongswan:strongswan:4.3.4:*:*:*:*:*:*:*
    • cpe:2.3:a:strongswan:strongswan:4.3.5:*:*:*:*:*:*:*
    • cpe:2.3:a:strongswan:strongswan:4.3.6:*:*:*:*:*:*:*
    • cpe:2.3:a:strongswan:strongswan:4.4.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

14

News mentions

0

No linked articles in our index yet.