VYPR
Unrated severityNVD Advisory· Published Nov 17, 2011· Updated Apr 29, 2026

CVE-2011-4073

CVE-2011-4073

Description

Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions.

Affected products

73
  • Xelerance/Openswan73 versions
    cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*+ 72 more
    • cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.