Unrated severityNVD Advisory· Published Nov 17, 2011· Updated Apr 29, 2026
CVE-2011-4073
CVE-2011-4073
Description
Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions.
Affected products
73cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*+ 72 more
- cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- secunia.com/advisories/46678nvdVendor Advisory
- secunia.com/advisories/46681nvdVendor Advisory
- secunia.com/advisories/47342nvdVendor Advisory
- www.debian.org/security/2011/dsa-2374nvd
- www.openswan.org/download/CVE-2011-4073/CVE-2011-4073.txtnvd
- www.redhat.com/support/errata/RHSA-2011-1422.htmlnvd
- www.securityfocus.com/bid/50440nvd
- www.securitytracker.com/idnvd
News mentions
0No linked articles in our index yet.