Vulnerabilites related to openvpn - openvpn
CVE-2005-2531 (GCVE-0-2005-2531)
Vulnerability from cvelistv5
Published
2005-08-24 04:00
Modified
2024-08-07 22:30
Severity ?
CWE
  • n/a
Summary
OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts.
References
http://www.securityfocus.com/bid/14605 vdb-entry, x_refsource_BID
http://secunia.com/advisories/17103 third-party-advisory, x_refsource_SECUNIA
http://openvpn.net/changelog.html x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDKSA-2005:145 vendor-advisory, x_refsource_MANDRIVA
http://www.novell.com/linux/security/advisories/2005_20_sr.html vendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2005/dsa-851 vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/16463 third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:30:01.294Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "14605",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14605"
          },
          {
            "name": "17103",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17103"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://openvpn.net/changelog.html"
          },
          {
            "name": "MDKSA-2005:145",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
          },
          {
            "name": "SUSE-SR:2005:020",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_20_sr.html"
          },
          {
            "name": "DSA-851",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-851"
          },
          {
            "name": "16463",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16463"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN before 2.0.1, when running with \"verb 0\" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-09-23T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "14605",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14605"
        },
        {
          "name": "17103",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17103"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://openvpn.net/changelog.html"
        },
        {
          "name": "MDKSA-2005:145",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
        },
        {
          "name": "SUSE-SR:2005:020",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_20_sr.html"
        },
        {
          "name": "DSA-851",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-851"
        },
        {
          "name": "16463",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16463"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2531",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN before 2.0.1, when running with \"verb 0\" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "14605",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14605"
            },
            {
              "name": "17103",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17103"
            },
            {
              "name": "http://openvpn.net/changelog.html",
              "refsource": "CONFIRM",
              "url": "http://openvpn.net/changelog.html"
            },
            {
              "name": "MDKSA-2005:145",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
            },
            {
              "name": "SUSE-SR:2005:020",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_20_sr.html"
            },
            {
              "name": "DSA-851",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-851"
            },
            {
              "name": "16463",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16463"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2531",
    "datePublished": "2005-08-24T04:00:00",
    "dateReserved": "2005-08-10T00:00:00",
    "dateUpdated": "2024-08-07T22:30:01.294Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-28882 (GCVE-0-2024-28882)
Vulnerability from cvelistv5
Published
2024-07-08 21:30
Modified
2024-11-01 20:38
CWE
  • CWE-772 - Missing Release of Resource after Effective Lifetime
Summary
OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session
Impacted products
Vendor Product Version
OpenVPN OpenVPN Version: 2.6.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "LOW",
              "baseScore": 4.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-28882",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-09T14:48:10.705315Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-01T20:38:32.966Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T01:03:50.213Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-28882"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "OpenVPN",
          "vendor": "OpenVPN",
          "versions": [
            {
              "lessThanOrEqual": "2.6.10",
              "status": "affected",
              "version": "2.6.0",
              "versionType": "patch"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-772",
              "description": "Missing Release of Resource after Effective Lifetime",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-09T12:19:57.631Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-28882"
        },
        {
          "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2024-28882",
    "datePublished": "2024-07-08T21:30:24.798Z",
    "dateReserved": "2024-03-12T18:26:01.733Z",
    "dateUpdated": "2024-11-01T20:38:32.966Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-7522 (GCVE-0-2017-7522)
Vulnerability from cvelistv5
Published
2017-06-27 13:00
Modified
2024-08-05 16:04
Severity ?
CWE
Summary
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service by authenticated remote attacker via sending a certificate with an embedded NULL character.
References
Impacted products
Vendor Product Version
OpenVPN Technologies, Inc OpenVPN Version: before 2.4.3
Version: before 2.3.17
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:04:11.857Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
          },
          {
            "name": "1038768",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038768"
          },
          {
            "name": "99230",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/99230"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "OpenVPN",
          "vendor": "OpenVPN Technologies, Inc",
          "versions": [
            {
              "status": "affected",
              "version": "before 2.4.3"
            },
            {
              "status": "affected",
              "version": "before 2.3.17"
            }
          ]
        }
      ],
      "datePublic": "2017-06-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service by authenticated remote attacker via sending a certificate with an embedded NULL character."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-06T09:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
        },
        {
          "name": "1038768",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038768"
        },
        {
          "name": "99230",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/99230"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2017-7522",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "OpenVPN",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 2.4.3"
                          },
                          {
                            "version_value": "before 2.3.17"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "OpenVPN Technologies, Inc"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service by authenticated remote attacker via sending a certificate with an embedded NULL character."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243",
              "refsource": "CONFIRM",
              "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
            },
            {
              "name": "1038768",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038768"
            },
            {
              "name": "99230",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/99230"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2017-7522",
    "datePublished": "2017-06-27T13:00:00",
    "dateReserved": "2017-04-05T00:00:00",
    "dateUpdated": "2024-08-05T16:04:11.857Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-3606 (GCVE-0-2021-3606)
Vulnerability from cvelistv5
Published
2021-07-02 12:30
Modified
2024-08-03 17:01
Severity ?
CWE
  • CWE-427 - Uncontrolled Search Path Element
Summary
OpenVPN before version 2.5.3 on Windows allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (openvpn.exe).
Impacted products
Vendor Product Version
n/a OpenVPN-GUI Version: 2.5.2 and prior releases
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:01:07.343Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/CVE-2021-3606"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "OpenVPN-GUI",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "2.5.2 and prior releases"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN before version 2.5.3 on Windows allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (openvpn.exe)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427 Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-02T12:30:38",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2021-3606"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@openvpn.net",
          "ID": "CVE-2021-3606",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "OpenVPN-GUI",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2.5.2 and prior releases"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN before version 2.5.3 on Windows allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (openvpn.exe)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-427 Uncontrolled Search Path Element"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements",
              "refsource": "MISC",
              "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
            },
            {
              "name": "https://community.openvpn.net/openvpn/wiki/CVE-2021-3606",
              "refsource": "MISC",
              "url": "https://community.openvpn.net/openvpn/wiki/CVE-2021-3606"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2021-3606",
    "datePublished": "2021-07-02T12:30:38",
    "dateReserved": "2021-06-17T00:00:00",
    "dateUpdated": "2024-08-03T17:01:07.343Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-24974 (GCVE-0-2024-24974)
Vulnerability from cvelistv5
Published
2024-07-08 10:20
Modified
2024-08-10 03:55
CWE
  • CWE-923 - Improper Restriction of Communication Channel to Intended Endpoints
Summary
The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.
Impacted products
Vendor Product Version
OpenVPN OpenVPN 2 Version: 2.6.9 and earlier
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "openvpn",
            "vendor": "openvpn",
            "versions": [
              {
                "lessThan": "2.5.10",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:openvpn:openvpn:2.6.0:-:*:*:community:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "openvpn",
            "vendor": "openvpn",
            "versions": [
              {
                "lessThan": "2.6.10",
                "status": "affected",
                "version": "2.6.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-24974",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-10T03:55:21.896Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:36:21.292Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-24974"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Interactive Service"
          ],
          "platforms": [
            "Windows"
          ],
          "product": "OpenVPN 2",
          "vendor": "OpenVPN",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.9 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-923",
              "description": "Improper Restriction of Communication Channel to Intended Endpoints",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-08T10:22:24.212Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-24974"
        },
        {
          "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/"
        },
        {
          "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2024-24974",
    "datePublished": "2024-07-08T10:20:34.520Z",
    "dateReserved": "2024-03-12T18:26:01.713Z",
    "dateUpdated": "2024-08-10T03:55:21.896Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2704 (GCVE-0-2025-2704)
Vulnerability from cvelistv5
Published
2025-04-02 21:00
Modified
2025-04-07 17:23
CWE
  • CWE-754 - Improper Check for Unusual or Exceptional Conditions
Summary
OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase
Impacted products
Vendor Product Version
OpenVPN OpenVPN Version: 2.6.1    2.6.13
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-04-03T00:11:05.289Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://www.openwall.com/lists/oss-security/2025/04/02/5"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-2704",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T17:20:44.473236Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T17:23:59.009Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "OpenVPN",
          "vendor": "OpenVPN",
          "versions": [
            {
              "lessThanOrEqual": "2.6.13",
              "status": "affected",
              "version": "2.6.1",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-754",
              "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-02T21:00:58.582Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2025-2704"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2025-2704",
    "datePublished": "2025-04-02T21:00:58.582Z",
    "dateReserved": "2025-03-24T10:26:42.493Z",
    "dateUpdated": "2025-04-07T17:23:59.009Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-27459 (GCVE-0-2024-27459)
Vulnerability from cvelistv5
Published
2024-07-08 10:14
Modified
2024-08-23 15:05
CWE
  • CWE-121 - Stack-based Buffer Overflow
Summary
The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.
Impacted products
Vendor Product Version
OpenVPN OpenVPN GUI Version: 2.6.9 and earlier
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:openvpn:openvpn_gui:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "openvpn_gui",
            "vendor": "openvpn",
            "versions": [
              {
                "lessThanOrEqual": "2.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.2,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-27459",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-23T15:31:20.276661Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-23T15:05:42.997Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:34:52.326Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-27459"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "OpenVPN GUI",
          "vendor": "OpenVPN",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.9 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "Stack-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-08T10:14:38.971Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-27459"
        },
        {
          "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/"
        },
        {
          "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2024-27459",
    "datePublished": "2024-07-08T10:14:06.208Z",
    "dateReserved": "2024-03-12T18:26:01.720Z",
    "dateUpdated": "2024-08-23T15:05:42.997Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2533 (GCVE-0-2005-2533)
Vulnerability from cvelistv5
Published
2005-08-24 04:00
Modified
2024-08-07 22:30
Severity ?
CWE
  • n/a
Summary
OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses.
References
http://secunia.com/advisories/17103 third-party-advisory, x_refsource_SECUNIA
http://openvpn.net/changelog.html x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDKSA-2005:145 vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2005/dsa-851 vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/16463 third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:30:01.165Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17103",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17103"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://openvpn.net/changelog.html"
          },
          {
            "name": "MDKSA-2005:145",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
          },
          {
            "name": "DSA-851",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-851"
          },
          {
            "name": "16463",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16463"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN before 2.0.1, when running in \"dev tap\" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-09-23T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17103",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17103"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://openvpn.net/changelog.html"
        },
        {
          "name": "MDKSA-2005:145",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
        },
        {
          "name": "DSA-851",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-851"
        },
        {
          "name": "16463",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16463"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2533",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN before 2.0.1, when running in \"dev tap\" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17103",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17103"
            },
            {
              "name": "http://openvpn.net/changelog.html",
              "refsource": "CONFIRM",
              "url": "http://openvpn.net/changelog.html"
            },
            {
              "name": "MDKSA-2005:145",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
            },
            {
              "name": "DSA-851",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-851"
            },
            {
              "name": "16463",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16463"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2533",
    "datePublished": "2005-08-24T04:00:00",
    "dateReserved": "2005-08-10T00:00:00",
    "dateUpdated": "2024-08-07T22:30:01.165Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2532 (GCVE-0-2005-2532)
Vulnerability from cvelistv5
Published
2005-08-24 04:00
Modified
2024-08-07 22:30
Severity ?
CWE
  • n/a
Summary
OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted.
References
http://secunia.com/advisories/17103 third-party-advisory, x_refsource_SECUNIA
http://openvpn.net/changelog.html x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDKSA-2005:145 vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2005/dsa-851 vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/14607 vdb-entry, x_refsource_BID
http://secunia.com/advisories/16463 third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:30:01.155Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17103",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17103"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://openvpn.net/changelog.html"
          },
          {
            "name": "MDKSA-2005:145",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
          },
          {
            "name": "DSA-851",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-851"
          },
          {
            "name": "14607",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14607"
          },
          {
            "name": "16463",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16463"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-09-23T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17103",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17103"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://openvpn.net/changelog.html"
        },
        {
          "name": "MDKSA-2005:145",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
        },
        {
          "name": "DSA-851",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-851"
        },
        {
          "name": "14607",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14607"
        },
        {
          "name": "16463",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16463"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2532",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17103",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17103"
            },
            {
              "name": "http://openvpn.net/changelog.html",
              "refsource": "CONFIRM",
              "url": "http://openvpn.net/changelog.html"
            },
            {
              "name": "MDKSA-2005:145",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
            },
            {
              "name": "DSA-851",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-851"
            },
            {
              "name": "14607",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14607"
            },
            {
              "name": "16463",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16463"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2532",
    "datePublished": "2005-08-24T04:00:00",
    "dateReserved": "2005-08-10T00:00:00",
    "dateUpdated": "2024-08-07T22:30:01.155Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-46849 (GCVE-0-2023-46849)
Vulnerability from cvelistv5
Published
2023-11-11 00:05
Modified
2025-06-11 14:30
CWE
Summary
Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T20:53:21.915Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-46849"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5555"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-46849",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-11T14:28:40.866061Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-11T14:30:02.796Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "OpenVPN 2 (Community)",
          "vendor": "OpenVPN",
          "versions": [
            {
              "lessThanOrEqual": "2.6.6",
              "status": "affected",
              "version": "2.6.0",
              "versionType": "minor release"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux"
          ],
          "product": "Access Server",
          "vendor": "OpenVPN",
          "versions": [
            {
              "lessThanOrEqual": "2.11.3",
              "status": "affected",
              "version": "2.11.0",
              "versionType": "patch release"
            },
            {
              "lessThanOrEqual": "2.12.1",
              "status": "affected",
              "version": "2.12.0",
              "versionType": "patch release"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-369",
              "description": "CWE-369 Divide By Zero",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-29T02:06:19.217Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-46849"
        },
        {
          "url": "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5555"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2023-46849",
    "datePublished": "2023-11-11T00:05:13.487Z",
    "dateReserved": "2023-10-27T13:38:49.496Z",
    "dateUpdated": "2025-06-11T14:30:02.796Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-46850 (GCVE-0-2023-46850)
Vulnerability from cvelistv5
Published
2023-11-11 00:15
Modified
2025-02-13 17:14
Severity ?
CWE
Summary
Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T20:53:21.910Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-46850"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5555"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-46850",
                "options": [
                  {
                    "Exploitation": "None"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "Total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-08T21:43:36.505056Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-08T21:44:02.391Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "OpenVPN 2 (Community)",
          "vendor": "OpenVPN",
          "versions": [
            {
              "lessThanOrEqual": "2.6.6",
              "status": "affected",
              "version": "2.6.0",
              "versionType": "minor release"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux"
          ],
          "product": "Access Server",
          "vendor": "OpenVPN",
          "versions": [
            {
              "lessThanOrEqual": "2.11.3",
              "status": "affected",
              "version": "2.11.0",
              "versionType": "patch release"
            },
            {
              "lessThanOrEqual": "2.12.2",
              "status": "affected",
              "version": "2.12.0",
              "versionType": "patch release"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-416",
              "description": "CWE-416 Use After Free",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-29T02:06:20.991Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-46850"
        },
        {
          "url": "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5555"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2023-46850",
    "datePublished": "2023-11-11T00:15:07.076Z",
    "dateReserved": "2023-10-27T13:38:49.496Z",
    "dateUpdated": "2025-02-13T17:14:45.269Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-7544 (GCVE-0-2018-7544)
Vulnerability from cvelistv5
Published
2018-03-16 15:00
Modified
2024-11-14 20:46
Severity ?
CWE
  • n/a
Summary
A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a "signal SIGTERM" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T06:31:04.558Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.0xlabs.com/2018/03/openvpn-remote-information-disclosure.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2018-7544",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-14T20:46:06.262821Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-14T20:46:28.947Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-03-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a \"signal SIGTERM\" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-03-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.0xlabs.com/2018/03/openvpn-remote-information-disclosure.html"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-7544",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED ** A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a \"signal SIGTERM\" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://blog.0xlabs.com/2018/03/openvpn-remote-information-disclosure.html",
              "refsource": "MISC",
              "url": "http://blog.0xlabs.com/2018/03/openvpn-remote-information-disclosure.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-7544",
    "datePublished": "2018-03-16T15:00:00",
    "dateReserved": "2018-02-27T00:00:00",
    "dateUpdated": "2024-11-14T20:46:28.947Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-5455 (GCVE-0-2014-5455)
Vulnerability from cvelistv5
Published
2014-08-25 16:00
Modified
2024-08-06 11:48
Severity ?
CWE
  • n/a
Summary
Unquoted Windows search path vulnerability in the ptservice service prior to PrivateTunnel version 3.0 (Windows) and OpenVPN Connect version 3.1 (Windows) allows local users to gain privileges via a crafted program.exe file in the %SYSTEMDRIVE% folder.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T11:48:49.221Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "34037",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/34037"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5192.php"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/127439/OpenVPN-Private-Tunnel-Privilege-Escalation.html"
          },
          {
            "name": "HPSBGN3551",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05325943"
          },
          {
            "name": "109007",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/show/osvdb/109007"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/CVEProject/cvelist/pull/3909/commits/ace34f1cf94602f31760d3eb7ae68e17df8f914d"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/CVEProject/cvelist/pull/3909"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-07-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unquoted Windows search path vulnerability in the ptservice service prior to PrivateTunnel version 3.0 (Windows) and OpenVPN Connect version 3.1 (Windows) allows local users to gain privileges via a crafted program.exe file in the %SYSTEMDRIVE% folder."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-06-01T14:58:11",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "34037",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/34037"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5192.php"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/127439/OpenVPN-Private-Tunnel-Privilege-Escalation.html"
        },
        {
          "name": "HPSBGN3551",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05325943"
        },
        {
          "name": "109007",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/show/osvdb/109007"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/CVEProject/cvelist/pull/3909/commits/ace34f1cf94602f31760d3eb7ae68e17df8f914d"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/CVEProject/cvelist/pull/3909"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-5455",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unquoted Windows search path vulnerability in the ptservice service prior to PrivateTunnel version 3.0 (Windows) and OpenVPN Connect version 3.1 (Windows) allows local users to gain privileges via a crafted program.exe file in the %SYSTEMDRIVE% folder."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "34037",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/34037"
            },
            {
              "name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5192.php",
              "refsource": "MISC",
              "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5192.php"
            },
            {
              "name": "http://packetstormsecurity.com/files/127439/OpenVPN-Private-Tunnel-Privilege-Escalation.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/127439/OpenVPN-Private-Tunnel-Privilege-Escalation.html"
            },
            {
              "name": "HPSBGN3551",
              "refsource": "HP",
              "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05325943"
            },
            {
              "name": "109007",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/show/osvdb/109007"
            },
            {
              "name": "https://github.com/CVEProject/cvelist/pull/3909/commits/ace34f1cf94602f31760d3eb7ae68e17df8f914d",
              "refsource": "MISC",
              "url": "https://github.com/CVEProject/cvelist/pull/3909/commits/ace34f1cf94602f31760d3eb7ae68e17df8f914d"
            },
            {
              "name": "https://github.com/CVEProject/cvelist/pull/3909",
              "refsource": "MISC",
              "url": "https://github.com/CVEProject/cvelist/pull/3909"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-5455",
    "datePublished": "2014-08-25T16:00:00",
    "dateReserved": "2014-08-25T00:00:00",
    "dateUpdated": "2024-08-06T11:48:49.221Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-4877 (GCVE-0-2024-4877)
Vulnerability from cvelistv5
Published
2025-04-03 15:11
Modified
2025-04-04 13:25
CWE
Summary
OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges
Impacted products
Vendor Product Version
OpenVPN OpenVPN Version: 2.4.0    2.6.11
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-4877",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-04T13:23:24.817604Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-04T13:25:17.430Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "OpenVPN",
          "vendor": "OpenVPN",
          "versions": [
            {
              "lessThanOrEqual": "2.6.11",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-268",
              "description": "CWE-268 Privilege Chaining",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-03T15:11:51.057Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-4877"
        },
        {
          "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2024-4877",
    "datePublished": "2025-04-03T15:11:51.057Z",
    "dateReserved": "2024-05-14T17:31:57.913Z",
    "dateUpdated": "2025-04-04T13:25:17.430Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-27903 (GCVE-0-2024-27903)
Vulnerability from cvelistv5
Published
2024-07-08 10:27
Modified
2024-08-23 03:55
CWE
Summary
OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service.
Impacted products
Vendor Product Version
OpenVPN OpenVPN 2 Version: 2.6.9 and earlier
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:openvpn:openvpn2:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "openvpn2",
            "vendor": "openvpn",
            "versions": [
              {
                "lessThan": "2.6.10",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.2,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-27903",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-21T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-23T03:55:35.767Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:41:55.566Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-27903"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Core"
          ],
          "platforms": [
            "Windows"
          ],
          "product": "OpenVPN 2",
          "vendor": "OpenVPN",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.9 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-283",
              "description": "Unverified Ownership",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-08T10:27:40.125Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-27903"
        },
        {
          "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/"
        },
        {
          "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2024-27903",
    "datePublished": "2024-07-08T10:27:40.125Z",
    "dateReserved": "2024-03-12T18:26:01.705Z",
    "dateUpdated": "2024-08-23T03:55:35.767Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1629 (GCVE-0-2006-1629)
Vulnerability from cvelistv5
Published
2006-04-06 22:00
Modified
2024-08-07 17:19
Severity ?
CWE
  • n/a
Summary
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/25667 vdb-entry, x_refsource_XF
http://www.mandriva.com/security/advisories?name=MDKSA-2006:069 vendor-advisory, x_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2006/1261 vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/17392 vdb-entry, x_refsource_BID
http://openvpn.net/changelog.html x_refsource_CONFIRM
http://www.osreviews.net/reviews/security/openvpn-print x_refsource_MISC
http://secunia.com/advisories/19531 third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1045 vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/19598 third-party-advisory, x_refsource_SECUNIA
http://sourceforge.net/mailarchive/forum.php?thread_id=10093825&forum_id=8482 x_refsource_CONFIRM
http://secunia.com/advisories/19837 third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/24444 vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/19897 third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2006_04_28.html vendor-advisory, x_refsource_SUSE
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:19:48.809Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openvpn-ldpreload-code-execution(25667)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25667"
          },
          {
            "name": "MDKSA-2006:069",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:069"
          },
          {
            "name": "ADV-2006-1261",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1261"
          },
          {
            "name": "17392",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17392"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://openvpn.net/changelog.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.osreviews.net/reviews/security/openvpn-print"
          },
          {
            "name": "19531",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19531"
          },
          {
            "name": "DSA-1045",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1045"
          },
          {
            "name": "19598",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19598"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/mailarchive/forum.php?thread_id=10093825\u0026forum_id=8482"
          },
          {
            "name": "19837",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19837"
          },
          {
            "name": "24444",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/24444"
          },
          {
            "name": "19897",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19897"
          },
          {
            "name": "SUSE-SR:2006:009",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_04_28.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-04-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "openvpn-ldpreload-code-execution(25667)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25667"
        },
        {
          "name": "MDKSA-2006:069",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:069"
        },
        {
          "name": "ADV-2006-1261",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1261"
        },
        {
          "name": "17392",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17392"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://openvpn.net/changelog.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.osreviews.net/reviews/security/openvpn-print"
        },
        {
          "name": "19531",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19531"
        },
        {
          "name": "DSA-1045",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1045"
        },
        {
          "name": "19598",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19598"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/mailarchive/forum.php?thread_id=10093825\u0026forum_id=8482"
        },
        {
          "name": "19837",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19837"
        },
        {
          "name": "24444",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/24444"
        },
        {
          "name": "19897",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19897"
        },
        {
          "name": "SUSE-SR:2006:009",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_04_28.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1629",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openvpn-ldpreload-code-execution(25667)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25667"
            },
            {
              "name": "MDKSA-2006:069",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:069"
            },
            {
              "name": "ADV-2006-1261",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1261"
            },
            {
              "name": "17392",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17392"
            },
            {
              "name": "http://openvpn.net/changelog.html",
              "refsource": "CONFIRM",
              "url": "http://openvpn.net/changelog.html"
            },
            {
              "name": "http://www.osreviews.net/reviews/security/openvpn-print",
              "refsource": "MISC",
              "url": "http://www.osreviews.net/reviews/security/openvpn-print"
            },
            {
              "name": "19531",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19531"
            },
            {
              "name": "DSA-1045",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1045"
            },
            {
              "name": "19598",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19598"
            },
            {
              "name": "http://sourceforge.net/mailarchive/forum.php?thread_id=10093825\u0026forum_id=8482",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/mailarchive/forum.php?thread_id=10093825\u0026forum_id=8482"
            },
            {
              "name": "19837",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19837"
            },
            {
              "name": "24444",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/24444"
            },
            {
              "name": "19897",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19897"
            },
            {
              "name": "SUSE-SR:2006:009",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_04_28.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1629",
    "datePublished": "2006-04-06T22:00:00",
    "dateReserved": "2006-04-05T00:00:00",
    "dateUpdated": "2024-08-07T17:19:48.809Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-2229 (GCVE-0-2006-2229)
Vulnerability from cvelistv5
Published
2006-05-05 19:00
Modified
2024-08-07 17:43
Severity ?
CWE
  • n/a
Summary
OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:43:28.654Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://openvpn.net/man.html"
          },
          {
            "name": "20060503 Re: OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/433000/100/0/threaded"
          },
          {
            "name": "20060503 Re: OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/432867/100/0/threaded"
          },
          {
            "name": "20060503 OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/432863/100/0/threaded"
          },
          {
            "name": "25660",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/25660"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://openvpn.net/man.html"
        },
        {
          "name": "20060503 Re: OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/433000/100/0/threaded"
        },
        {
          "name": "20060503 Re: OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/432867/100/0/threaded"
        },
        {
          "name": "20060503 OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/432863/100/0/threaded"
        },
        {
          "name": "25660",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/25660"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2229",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://openvpn.net/man.html",
              "refsource": "MISC",
              "url": "http://openvpn.net/man.html"
            },
            {
              "name": "20060503 Re: OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/433000/100/0/threaded"
            },
            {
              "name": "20060503 Re: OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/432867/100/0/threaded"
            },
            {
              "name": "20060503 OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/432863/100/0/threaded"
            },
            {
              "name": "25660",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/25660"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2229",
    "datePublished": "2006-05-05T19:00:00",
    "dateReserved": "2006-05-05T00:00:00",
    "dateUpdated": "2024-08-07T17:43:28.654Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-9336 (GCVE-0-2018-9336)
Vulnerability from cvelistv5
Published
2018-05-01 18:00
Modified
2024-08-05 07:17
Severity ?
CWE
  • n/a
Summary
openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T07:17:52.100Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/OpenVPN/openvpn/releases/tag/v2.4.6"
          },
          {
            "name": "SSA:2018-116-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2018\u0026m=slackware-security.568761"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.tenable.com/security/research/tra-2018-09"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-04-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-05-05T09:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/OpenVPN/openvpn/releases/tag/v2.4.6"
        },
        {
          "name": "SSA:2018-116-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2018\u0026m=slackware-security.568761"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.tenable.com/security/research/tra-2018-09"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-9336",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/OpenVPN/openvpn/releases/tag/v2.4.6",
              "refsource": "CONFIRM",
              "url": "https://github.com/OpenVPN/openvpn/releases/tag/v2.4.6"
            },
            {
              "name": "SSA:2018-116-01",
              "refsource": "SLACKWARE",
              "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2018\u0026m=slackware-security.568761"
            },
            {
              "name": "https://www.tenable.com/security/research/tra-2018-09",
              "refsource": "MISC",
              "url": "https://www.tenable.com/security/research/tra-2018-09"
            },
            {
              "name": "https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b",
              "refsource": "CONFIRM",
              "url": "https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b"
            },
            {
              "name": "https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24",
              "refsource": "CONFIRM",
              "url": "https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-9336",
    "datePublished": "2018-05-01T18:00:00",
    "dateReserved": "2018-04-05T00:00:00",
    "dateUpdated": "2024-08-05T07:17:52.100Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-6329 (GCVE-0-2016-6329)
Vulnerability from cvelistv5
Published
2017-01-31 22:00
Modified
2024-08-06 01:29
Severity ?
CWE
  • n/a
Summary
OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:29:18.449Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://sweet32.info/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403"
          },
          {
            "name": "1036695",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1036695"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21991482"
          },
          {
            "name": "GLSA-201611-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201611-02"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/SWEET32"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697"
          },
          {
            "name": "92631",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/92631"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-08-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a \"Sweet32\" attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-07-09T12:06:03",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://sweet32.info/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403"
        },
        {
          "name": "1036695",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1036695"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21991482"
        },
        {
          "name": "GLSA-201611-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201611-02"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/SWEET32"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697"
        },
        {
          "name": "92631",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/92631"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2016-6329",
    "datePublished": "2017-01-31T22:00:00",
    "dateReserved": "2016-07-26T00:00:00",
    "dateUpdated": "2024-08-06T01:29:18.449Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-3547 (GCVE-0-2021-3547)
Vulnerability from cvelistv5
Published
2021-07-12 10:35
Modified
2024-08-03 17:01
Severity ?
CWE
  • CWE-305 - Authentication Bypass by Primary Weakness
Summary
OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration.
Impacted products
Vendor Product Version
n/a OpenVPN 3 Core Library Version: 3.6 and 3.6.1
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:01:06.568Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/CVE-2021-3547"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "OpenVPN 3 Core Library",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "3.6 and 3.6.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-305",
              "description": "CWE-305: Authentication Bypass by Primary Weakness",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-12T10:35:52",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2021-3547"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@openvpn.net",
          "ID": "CVE-2021-3547",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "OpenVPN 3 Core Library",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "3.6 and 3.6.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-305: Authentication Bypass by Primary Weakness"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements",
              "refsource": "MISC",
              "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
            },
            {
              "name": "https://community.openvpn.net/openvpn/wiki/CVE-2021-3547",
              "refsource": "MISC",
              "url": "https://community.openvpn.net/openvpn/wiki/CVE-2021-3547"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2021-3547",
    "datePublished": "2021-07-12T10:35:52",
    "dateReserved": "2021-05-11T00:00:00",
    "dateUpdated": "2024-08-03T17:01:06.568Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-12166 (GCVE-0-2017-12166)
Vulnerability from cvelistv5
Published
2017-10-03 19:00
Modified
2024-08-05 18:28
Severity ?
CWE
  • n/a
Summary
OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T18:28:16.530Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/CVE-2017-12166"
          },
          {
            "name": "101153",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/101153"
          },
          {
            "name": "1039470",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1039470"
          },
          {
            "name": "[debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-09-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T13:06:12",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2017-12166"
        },
        {
          "name": "101153",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/101153"
        },
        {
          "name": "1039470",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1039470"
        },
        {
          "name": "[debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2017-12166",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.openvpn.net/openvpn/wiki/CVE-2017-12166",
              "refsource": "MISC",
              "url": "https://community.openvpn.net/openvpn/wiki/CVE-2017-12166"
            },
            {
              "name": "101153",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/101153"
            },
            {
              "name": "1039470",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1039470"
            },
            {
              "name": "[debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2017-12166",
    "datePublished": "2017-10-03T19:00:00",
    "dateReserved": "2017-08-01T00:00:00",
    "dateUpdated": "2024-08-05T18:28:16.530Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-11810 (GCVE-0-2020-11810)
Vulnerability from cvelistv5
Published
2020-04-27 14:47
Modified
2024-08-04 11:42
Severity ?
CWE
  • n/a
Summary
An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:42:00.876Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/OpenVPN/openvpn/commit/37bc691e7d26ea4eb61a8a434ebd7a9ae76225ab"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/CVE-2020-11810"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.suse.com/show_bug.cgi?id=1169925"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/ticket/1272"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://patchwork.openvpn.net/patch/1079/"
          },
          {
            "name": "FEDORA-2020-c1cb4ebcd9",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGHHV4YZANZW45KZTJJGVGPFMSXYRCKZ/"
          },
          {
            "name": "FEDORA-2020-969414e05b",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JII7RYYYRBPQNEGGVSOXCM7JUZ43T3VH/"
          },
          {
            "name": "[debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2020-04-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim\u0027s peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim\u0027s connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T13:06:08",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/OpenVPN/openvpn/commit/37bc691e7d26ea4eb61a8a434ebd7a9ae76225ab"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security-tracker.debian.org/tracker/CVE-2020-11810"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.suse.com/show_bug.cgi?id=1169925"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://community.openvpn.net/openvpn/ticket/1272"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://patchwork.openvpn.net/patch/1079/"
        },
        {
          "name": "FEDORA-2020-c1cb4ebcd9",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGHHV4YZANZW45KZTJJGVGPFMSXYRCKZ/"
        },
        {
          "name": "FEDORA-2020-969414e05b",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JII7RYYYRBPQNEGGVSOXCM7JUZ43T3VH/"
        },
        {
          "name": "[debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-11810",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim\u0027s peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim\u0027s connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/OpenVPN/openvpn/commit/37bc691e7d26ea4eb61a8a434ebd7a9ae76225ab",
              "refsource": "CONFIRM",
              "url": "https://github.com/OpenVPN/openvpn/commit/37bc691e7d26ea4eb61a8a434ebd7a9ae76225ab"
            },
            {
              "name": "https://security-tracker.debian.org/tracker/CVE-2020-11810",
              "refsource": "MISC",
              "url": "https://security-tracker.debian.org/tracker/CVE-2020-11810"
            },
            {
              "name": "https://bugzilla.suse.com/show_bug.cgi?id=1169925",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.suse.com/show_bug.cgi?id=1169925"
            },
            {
              "name": "https://community.openvpn.net/openvpn/ticket/1272",
              "refsource": "CONFIRM",
              "url": "https://community.openvpn.net/openvpn/ticket/1272"
            },
            {
              "name": "https://patchwork.openvpn.net/patch/1079/",
              "refsource": "CONFIRM",
              "url": "https://patchwork.openvpn.net/patch/1079/"
            },
            {
              "name": "FEDORA-2020-c1cb4ebcd9",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGHHV4YZANZW45KZTJJGVGPFMSXYRCKZ/"
            },
            {
              "name": "FEDORA-2020-969414e05b",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JII7RYYYRBPQNEGGVSOXCM7JUZ43T3VH/"
            },
            {
              "name": "[debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-11810",
    "datePublished": "2020-04-27T14:47:01",
    "dateReserved": "2020-04-15T00:00:00",
    "dateUpdated": "2024-08-04T11:42:00.876Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-3409 (GCVE-0-2005-3409)
Vulnerability from cvelistv5
Published
2005-11-02 00:00
Modified
2024-08-07 23:10
Severity ?
CWE
  • n/a
Summary
OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.
References
http://secunia.com/advisories/17447 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/17480 third-party-advisory, x_refsource_SECUNIA
http://openvpn.net/changelog.html x_refsource_CONFIRM
http://www.novell.com/linux/security/advisories/2005_25_sr.html vendor-advisory, x_refsource_SUSE
http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml vendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/bid/15270 vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/415487 vendor-advisory, x_refsource_OPENPKG
http://secunia.com/advisories/17452 third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/20416 vdb-entry, x_refsource_OSVDB
http://www.debian.org/security/2005/dsa-885 vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/17376 third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:10:08.881Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17447",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17447"
          },
          {
            "name": "17480",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17480"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://openvpn.net/changelog.html"
          },
          {
            "name": "SUSE-SR:2005:025",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html"
          },
          {
            "name": "GLSA-200511-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml"
          },
          {
            "name": "15270",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15270"
          },
          {
            "name": "OpenPKG-SA-2005.023",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENPKG",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/415487"
          },
          {
            "name": "17452",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17452"
          },
          {
            "name": "20416",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/20416"
          },
          {
            "name": "DSA-885",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-885"
          },
          {
            "name": "17376",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17376"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-10-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17447",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17447"
        },
        {
          "name": "17480",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17480"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://openvpn.net/changelog.html"
        },
        {
          "name": "SUSE-SR:2005:025",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html"
        },
        {
          "name": "GLSA-200511-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml"
        },
        {
          "name": "15270",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15270"
        },
        {
          "name": "OpenPKG-SA-2005.023",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENPKG"
          ],
          "url": "http://www.securityfocus.com/archive/1/415487"
        },
        {
          "name": "17452",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17452"
        },
        {
          "name": "20416",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/20416"
        },
        {
          "name": "DSA-885",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-885"
        },
        {
          "name": "17376",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17376"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3409",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17447",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17447"
            },
            {
              "name": "17480",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17480"
            },
            {
              "name": "http://openvpn.net/changelog.html",
              "refsource": "CONFIRM",
              "url": "http://openvpn.net/changelog.html"
            },
            {
              "name": "SUSE-SR:2005:025",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html"
            },
            {
              "name": "GLSA-200511-07",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml"
            },
            {
              "name": "15270",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15270"
            },
            {
              "name": "OpenPKG-SA-2005.023",
              "refsource": "OPENPKG",
              "url": "http://www.securityfocus.com/archive/1/415487"
            },
            {
              "name": "17452",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17452"
            },
            {
              "name": "20416",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/20416"
            },
            {
              "name": "DSA-885",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-885"
            },
            {
              "name": "17376",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17376"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3409",
    "datePublished": "2005-11-02T00:00:00",
    "dateReserved": "2005-11-01T00:00:00",
    "dateUpdated": "2024-08-07T23:10:08.881Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-8104 (GCVE-0-2014-8104)
Vulnerability from cvelistv5
Published
2014-12-03 18:00
Modified
2024-08-06 13:10
Severity ?
CWE
  • n/a
Summary
OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:10:50.993Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDVSA-2015:139",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:139"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://advisories.mageia.org/MGASA-2014-0512.html"
          },
          {
            "name": "USN-2430-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2430-1"
          },
          {
            "name": "DSA-3084",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-3084"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b"
          },
          {
            "name": "openSUSE-SU-2014:1594",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00008.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-04-01T13:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "MDVSA-2015:139",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:139"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://advisories.mageia.org/MGASA-2014-0512.html"
        },
        {
          "name": "USN-2430-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2430-1"
        },
        {
          "name": "DSA-3084",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-3084"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b"
        },
        {
          "name": "openSUSE-SU-2014:1594",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00008.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2014-8104",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDVSA-2015:139",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:139"
            },
            {
              "name": "http://advisories.mageia.org/MGASA-2014-0512.html",
              "refsource": "CONFIRM",
              "url": "http://advisories.mageia.org/MGASA-2014-0512.html"
            },
            {
              "name": "USN-2430-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2430-1"
            },
            {
              "name": "DSA-3084",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-3084"
            },
            {
              "name": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b",
              "refsource": "CONFIRM",
              "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b"
            },
            {
              "name": "openSUSE-SU-2014:1594",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00008.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2014-8104",
    "datePublished": "2014-12-03T18:00:00",
    "dateReserved": "2014-10-10T00:00:00",
    "dateUpdated": "2024-08-06T13:10:50.993Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-7478 (GCVE-0-2017-7478)
Vulnerability from cvelistv5
Published
2017-05-15 18:00
Modified
2024-08-05 16:04
Severity ?
CWE
Summary
OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.
References
Impacted products
Vendor Product Version
OpenVPN Technologies, Inc openvpn Version: 2.3.12 and newer
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:04:11.580Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "41993",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/41993/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits"
          },
          {
            "name": "1038473",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038473"
          },
          {
            "name": "98444",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98444"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "openvpn",
          "vendor": "OpenVPN Technologies, Inc",
          "versions": [
            {
              "status": "affected",
              "version": "2.3.12 and newer"
            }
          ]
        }
      ],
      "datePublic": "2017-05-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-617",
              "description": "CWE-617",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-15T09:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "41993",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/41993/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits"
        },
        {
          "name": "1038473",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038473"
        },
        {
          "name": "98444",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98444"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2017-7478",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "openvpn",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2.3.12 and newer"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "OpenVPN Technologies, Inc"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-617"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "41993",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/41993/"
            },
            {
              "name": "https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits",
              "refsource": "CONFIRM",
              "url": "https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits"
            },
            {
              "name": "1038473",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038473"
            },
            {
              "name": "98444",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98444"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2017-7478",
    "datePublished": "2017-05-15T18:00:00",
    "dateReserved": "2017-04-05T00:00:00",
    "dateUpdated": "2024-08-05T16:04:11.580Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-2061 (GCVE-0-2013-2061)
Vulnerability from cvelistv5
Published
2013-11-15 18:16
Modified
2024-08-06 15:20
Severity ?
CWE
  • n/a
Summary
The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:20:37.491Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2013-7552",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105568.html"
          },
          {
            "name": "FEDORA-2013-7531",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105609.html"
          },
          {
            "name": "openSUSE-SU-2013:1645",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00012.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960192"
          },
          {
            "name": "[oss-security] 20130506 Re: CVE request: OpenVPN use of non-constant-time  memcmp in HMAC comparison in openvpn_decrypt",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/05/06/6"
          },
          {
            "name": "MDVSA-2013:167",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:167"
          },
          {
            "name": "openSUSE-SU-2013:1649",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00016.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.gentoo.org/show_bug.cgi?id=468756"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2ee"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-04-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-30T21:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2013-7552",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105568.html"
        },
        {
          "name": "FEDORA-2013-7531",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105609.html"
        },
        {
          "name": "openSUSE-SU-2013:1645",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00012.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960192"
        },
        {
          "name": "[oss-security] 20130506 Re: CVE request: OpenVPN use of non-constant-time  memcmp in HMAC comparison in openvpn_decrypt",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/05/06/6"
        },
        {
          "name": "MDVSA-2013:167",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:167"
        },
        {
          "name": "openSUSE-SU-2013:1649",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00016.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.gentoo.org/show_bug.cgi?id=468756"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2ee"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-2061",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2013-7552",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105568.html"
            },
            {
              "name": "FEDORA-2013-7531",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105609.html"
            },
            {
              "name": "openSUSE-SU-2013:1645",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00012.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=960192",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960192"
            },
            {
              "name": "[oss-security] 20130506 Re: CVE request: OpenVPN use of non-constant-time  memcmp in HMAC comparison in openvpn_decrypt",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/05/06/6"
            },
            {
              "name": "MDVSA-2013:167",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:167"
            },
            {
              "name": "openSUSE-SU-2013:1649",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00016.html"
            },
            {
              "name": "https://bugs.gentoo.org/show_bug.cgi?id=468756",
              "refsource": "CONFIRM",
              "url": "https://bugs.gentoo.org/show_bug.cgi?id=468756"
            },
            {
              "name": "https://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2ee",
              "refsource": "CONFIRM",
              "url": "https://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2ee"
            },
            {
              "name": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc",
              "refsource": "CONFIRM",
              "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-2061",
    "datePublished": "2013-11-15T18:16:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:20:37.491Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-3459 (GCVE-0-2008-3459)
Vulnerability from cvelistv5
Published
2008-08-04 19:00
Modified
2024-08-07 09:37
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:37:26.960Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://openvpn.net/index.php/documentation/change-log/changelog-21.html"
          },
          {
            "name": "openvpn-lladdr-iproute-code-execution(44209)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44209"
          },
          {
            "name": "30532",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30532"
          },
          {
            "name": "1020626",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020626"
          },
          {
            "name": "ADV-2008-2316",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2316"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-07-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://openvpn.net/index.php/documentation/change-log/changelog-21.html"
        },
        {
          "name": "openvpn-lladdr-iproute-code-execution(44209)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44209"
        },
        {
          "name": "30532",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30532"
        },
        {
          "name": "1020626",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020626"
        },
        {
          "name": "ADV-2008-2316",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2316"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-3459",
    "datePublished": "2008-08-04T19:00:00",
    "dateReserved": "2008-08-04T00:00:00",
    "dateUpdated": "2024-08-07T09:37:26.960Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-3393 (GCVE-0-2005-3393)
Vulnerability from cvelistv5
Published
2005-11-01 11:00
Modified
2024-08-07 23:10
Severity ?
CWE
  • n/a
Summary
Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option.
References
http://secunia.com/advisories/17447 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/17480 third-party-advisory, x_refsource_SECUNIA
http://openvpn.net/changelog.html x_refsource_CONFIRM
http://www.novell.com/linux/security/advisories/2005_25_sr.html vendor-advisory, x_refsource_SUSE
http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml vendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/bid/15239 vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/415487 vendor-advisory, x_refsource_OPENPKG
http://secunia.com/advisories/17452 third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2005/2255 vdb-entry, x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=113081023121059&w=2 mailing-list, x_refsource_BUGTRAQ
http://www.debian.org/security/2005/dsa-885 vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/17376 third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:10:08.617Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17447",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17447"
          },
          {
            "name": "17480",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17480"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://openvpn.net/changelog.html"
          },
          {
            "name": "SUSE-SR:2005:025",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html"
          },
          {
            "name": "GLSA-200511-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml"
          },
          {
            "name": "15239",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15239"
          },
          {
            "name": "OpenPKG-SA-2005.023",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENPKG",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/415487"
          },
          {
            "name": "17452",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17452"
          },
          {
            "name": "ADV-2005-2255",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2255"
          },
          {
            "name": "20051031 OpenVPN[v2.0.x]: foreign_option() formart string vulnerability.",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=113081023121059\u0026w=2"
          },
          {
            "name": "DSA-885",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-885"
          },
          {
            "name": "17376",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17376"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-10-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17447",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17447"
        },
        {
          "name": "17480",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17480"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://openvpn.net/changelog.html"
        },
        {
          "name": "SUSE-SR:2005:025",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html"
        },
        {
          "name": "GLSA-200511-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml"
        },
        {
          "name": "15239",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15239"
        },
        {
          "name": "OpenPKG-SA-2005.023",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENPKG"
          ],
          "url": "http://www.securityfocus.com/archive/1/415487"
        },
        {
          "name": "17452",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17452"
        },
        {
          "name": "ADV-2005-2255",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2255"
        },
        {
          "name": "20051031 OpenVPN[v2.0.x]: foreign_option() formart string vulnerability.",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=113081023121059\u0026w=2"
        },
        {
          "name": "DSA-885",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-885"
        },
        {
          "name": "17376",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17376"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3393",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17447",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17447"
            },
            {
              "name": "17480",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17480"
            },
            {
              "name": "http://openvpn.net/changelog.html",
              "refsource": "CONFIRM",
              "url": "http://openvpn.net/changelog.html"
            },
            {
              "name": "SUSE-SR:2005:025",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html"
            },
            {
              "name": "GLSA-200511-07",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml"
            },
            {
              "name": "15239",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15239"
            },
            {
              "name": "OpenPKG-SA-2005.023",
              "refsource": "OPENPKG",
              "url": "http://www.securityfocus.com/archive/1/415487"
            },
            {
              "name": "17452",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17452"
            },
            {
              "name": "ADV-2005-2255",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2255"
            },
            {
              "name": "20051031 OpenVPN[v2.0.x]: foreign_option() formart string vulnerability.",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=113081023121059\u0026w=2"
            },
            {
              "name": "DSA-885",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-885"
            },
            {
              "name": "17376",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17376"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3393",
    "datePublished": "2005-11-01T11:00:00",
    "dateReserved": "2005-11-01T00:00:00",
    "dateUpdated": "2024-08-07T23:10:08.617Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-20813 (GCVE-0-2020-20813)
Vulnerability from cvelistv5
Published
2023-08-22 00:00
Modified
2024-10-04 16:22
Severity ?
CWE
  • n/a
Summary
Control Channel in OpenVPN 2.4.7 and earlier allows remote attackers to cause a denial of service via crafted reset packet.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T14:22:25.545Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.freebuf.com/vuls/215171.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-20813",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-04T16:21:23.113433Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-400",
                "description": "CWE-400 Uncontrolled Resource Consumption",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-04T16:22:07.912Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Control Channel in OpenVPN 2.4.7 and earlier allows remote attackers to cause a denial of service via crafted reset packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-22T15:50:58.363960",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.freebuf.com/vuls/215171.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-20813",
    "datePublished": "2023-08-22T00:00:00",
    "dateReserved": "2020-08-13T00:00:00",
    "dateUpdated": "2024-10-04T16:22:07.912Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-7479 (GCVE-0-2017-7479)
Vulnerability from cvelistv5
Published
2017-05-15 18:00
Modified
2024-08-05 16:04
Severity ?
CWE
Summary
OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.
References
Impacted products
Vendor Product Version
OpenVPN Technologies, Inc openvpn Version: < 2.3.15
Version: < 2.4.2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:04:11.543Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits"
          },
          {
            "name": "1038473",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038473"
          },
          {
            "name": "DSA-3900",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3900"
          },
          {
            "name": "98443",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98443"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "openvpn",
          "vendor": "OpenVPN Technologies, Inc",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 2.3.15"
            },
            {
              "status": "affected",
              "version": "\u003c 2.4.2"
            }
          ]
        }
      ],
      "datePublic": "2017-05-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-617",
              "description": "CWE-617",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits"
        },
        {
          "name": "1038473",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038473"
        },
        {
          "name": "DSA-3900",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3900"
        },
        {
          "name": "98443",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98443"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2017-7479",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "openvpn",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003c 2.3.15"
                          },
                          {
                            "version_value": "\u003c 2.4.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "OpenVPN Technologies, Inc"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-617"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits",
              "refsource": "CONFIRM",
              "url": "https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits"
            },
            {
              "name": "1038473",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038473"
            },
            {
              "name": "DSA-3900",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3900"
            },
            {
              "name": "98443",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98443"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2017-7479",
    "datePublished": "2017-05-15T18:00:00",
    "dateReserved": "2017-04-05T00:00:00",
    "dateUpdated": "2024-08-05T16:04:11.543Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-7508 (GCVE-0-2017-7508)
Vulnerability from cvelistv5
Published
2017-06-27 13:00
Modified
2024-08-05 16:04
Severity ?
CWE
  • CVE-2017-7508
Summary
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet.
References
Impacted products
Vendor Product Version
OpenVPN Technologies, Inc OpenVPN Version: before 2.4.3
Version: before 2.3.17
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:04:11.917Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
          },
          {
            "name": "1038768",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038768"
          },
          {
            "name": "99230",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/99230"
          },
          {
            "name": "DSA-3900",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3900"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "OpenVPN",
          "vendor": "OpenVPN Technologies, Inc",
          "versions": [
            {
              "status": "affected",
              "version": "before 2.4.3"
            },
            {
              "status": "affected",
              "version": "before 2.3.17"
            }
          ]
        }
      ],
      "datePublic": "2017-06-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CVE-2017-7508",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
        },
        {
          "name": "1038768",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038768"
        },
        {
          "name": "99230",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/99230"
        },
        {
          "name": "DSA-3900",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3900"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2017-7508",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "OpenVPN",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 2.4.3"
                          },
                          {
                            "version_value": "before 2.3.17"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "OpenVPN Technologies, Inc"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CVE-2017-7508"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243",
              "refsource": "CONFIRM",
              "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
            },
            {
              "name": "1038768",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038768"
            },
            {
              "name": "99230",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/99230"
            },
            {
              "name": "DSA-3900",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3900"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2017-7508",
    "datePublished": "2017-06-27T13:00:00",
    "dateReserved": "2017-04-05T00:00:00",
    "dateUpdated": "2024-08-05T16:04:11.917Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-5594 (GCVE-0-2024-5594)
Vulnerability from cvelistv5
Published
2025-01-06 13:52
Modified
2025-04-08 20:40
Severity ?
CWE
  • CWE-1287 - Improper Validation of Specified Type of Input
Summary
OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 9.1,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-5594",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-06T16:56:30.416711Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-08T20:40:13.684Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "OpenVPN",
          "vendor": "OpenVPN",
          "versions": [
            {
              "lessThan": "2.6.11",
              "status": "affected",
              "version": "0",
              "versionType": "patch"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1287",
              "description": "Improper Validation of Specified Type of Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-02T21:00:17.688Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-5594"
        },
        {
          "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2024-5594",
    "datePublished": "2025-01-06T13:52:20.272Z",
    "dateReserved": "2024-06-03T08:46:40.371Z",
    "dateUpdated": "2025-04-08T20:40:13.684Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2534 (GCVE-0-2005-2534)
Vulnerability from cvelistv5
Published
2005-08-24 04:00
Modified
2024-08-07 22:30
Severity ?
CWE
  • n/a
Summary
Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate.
References
http://secunia.com/advisories/17103 third-party-advisory, x_refsource_SECUNIA
http://openvpn.net/changelog.html x_refsource_CONFIRM
http://www.securityfocus.com/bid/14610 vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDKSA-2005:145 vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2005/dsa-851 vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/16463 third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:30:01.604Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17103",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17103"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://openvpn.net/changelog.html"
          },
          {
            "name": "14610",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14610"
          },
          {
            "name": "MDKSA-2005:145",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
          },
          {
            "name": "DSA-851",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-851"
          },
          {
            "name": "16463",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16463"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-09-23T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17103",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17103"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://openvpn.net/changelog.html"
        },
        {
          "name": "14610",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14610"
        },
        {
          "name": "MDKSA-2005:145",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
        },
        {
          "name": "DSA-851",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-851"
        },
        {
          "name": "16463",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16463"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2534",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17103",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17103"
            },
            {
              "name": "http://openvpn.net/changelog.html",
              "refsource": "CONFIRM",
              "url": "http://openvpn.net/changelog.html"
            },
            {
              "name": "14610",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14610"
            },
            {
              "name": "MDKSA-2005:145",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
            },
            {
              "name": "DSA-851",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-851"
            },
            {
              "name": "16463",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16463"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2534",
    "datePublished": "2005-08-24T04:00:00",
    "dateReserved": "2005-08-10T00:00:00",
    "dateUpdated": "2024-08-07T22:30:01.604Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-7521 (GCVE-0-2017-7521)
Vulnerability from cvelistv5
Published
2017-06-27 13:00
Modified
2024-08-05 16:04
Severity ?
CWE
Summary
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension().
References
Impacted products
Vendor Product Version
OpenVPN Technologies, Inc OpenVPN Version: before 2.4.3
Version: before 2.3.17
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:04:11.856Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
          },
          {
            "name": "1038768",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038768"
          },
          {
            "name": "99230",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/99230"
          },
          {
            "name": "DSA-3900",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3900"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "OpenVPN",
          "vendor": "OpenVPN Technologies, Inc",
          "versions": [
            {
              "status": "affected",
              "version": "before 2.4.3"
            },
            {
              "status": "affected",
              "version": "before 2.3.17"
            }
          ]
        }
      ],
      "datePublic": "2017-06-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension()."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
        },
        {
          "name": "1038768",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038768"
        },
        {
          "name": "99230",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/99230"
        },
        {
          "name": "DSA-3900",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3900"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2017-7521",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "OpenVPN",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 2.4.3"
                          },
                          {
                            "version_value": "before 2.3.17"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "OpenVPN Technologies, Inc"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension()."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-400"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243",
              "refsource": "CONFIRM",
              "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
            },
            {
              "name": "1038768",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038768"
            },
            {
              "name": "99230",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/99230"
            },
            {
              "name": "DSA-3900",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3900"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2017-7521",
    "datePublished": "2017-06-27T13:00:00",
    "dateReserved": "2017-04-05T00:00:00",
    "dateUpdated": "2024-08-05T16:04:11.856Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-15078 (GCVE-0-2020-15078)
Vulnerability from cvelistv5
Published
2021-04-26 13:19
Modified
2024-08-04 13:08
Severity ?
CWE
  • CWE-305 - Authentication Bypass by Primary Weakness
Summary
OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.
Impacted products
Vendor Product Version
n/a OpenVPN Version: 2.5.1 and earlier versions
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T13:08:21.675Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2021-242ef81244",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GJUXEYHUPREEBPX23VPEKMFXUPVO3PMU/"
          },
          {
            "name": "FEDORA-2021-b805c26afa",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLDB3OBQ3AODYYRN7NRCABV6I4AUFAT6/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/CVE-2020-15078"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
          },
          {
            "name": "FEDORA-2021-d6b9d8497b",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGEGLC4YGBDN5CGHTNWN2GH6DJJA36T2/"
          },
          {
            "name": "GLSA-202105-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202105-25"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/usn/usn-4933-1"
          },
          {
            "name": "[debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "OpenVPN",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "2.5.1 and earlier versions"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-305",
              "description": "CWE-305: Authentication Bypass by Primary Weakness",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T13:06:09",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "name": "FEDORA-2021-242ef81244",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GJUXEYHUPREEBPX23VPEKMFXUPVO3PMU/"
        },
        {
          "name": "FEDORA-2021-b805c26afa",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLDB3OBQ3AODYYRN7NRCABV6I4AUFAT6/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2020-15078"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
        },
        {
          "name": "FEDORA-2021-d6b9d8497b",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGEGLC4YGBDN5CGHTNWN2GH6DJJA36T2/"
        },
        {
          "name": "GLSA-202105-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202105-25"
        },
        {
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/usn/usn-4933-1"
        },
        {
          "name": "[debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@openvpn.net",
          "ID": "CVE-2020-15078",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "OpenVPN",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2.5.1 and earlier versions"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-305: Authentication Bypass by Primary Weakness"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2021-242ef81244",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GJUXEYHUPREEBPX23VPEKMFXUPVO3PMU/"
            },
            {
              "name": "FEDORA-2021-b805c26afa",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PLDB3OBQ3AODYYRN7NRCABV6I4AUFAT6/"
            },
            {
              "name": "https://community.openvpn.net/openvpn/wiki/CVE-2020-15078",
              "refsource": "MISC",
              "url": "https://community.openvpn.net/openvpn/wiki/CVE-2020-15078"
            },
            {
              "name": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements",
              "refsource": "MISC",
              "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
            },
            {
              "name": "FEDORA-2021-d6b9d8497b",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JGEGLC4YGBDN5CGHTNWN2GH6DJJA36T2/"
            },
            {
              "name": "GLSA-202105-25",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202105-25"
            },
            {
              "name": "https://usn.ubuntu.com/usn/usn-4933-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/usn/usn-4933-1"
            },
            {
              "name": "[debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2020-15078",
    "datePublished": "2021-04-26T13:19:45",
    "dateReserved": "2020-06-25T00:00:00",
    "dateUpdated": "2024-08-04T13:08:21.675Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-0547 (GCVE-0-2022-0547)
Vulnerability from cvelistv5
Published
2022-03-18 18:00
Modified
2025-04-23 18:46
Severity ?
CWE
  • CWE-305 - - Authentication Bypass by Primary Weakness
Summary
OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.
Impacted products
Vendor Product Version
n/a OpenVPN Version: version 2.1 until version 2.4.12 and 2.5.6.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:32:46.375Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/CVE-2022-0547"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://openvpn.net/community-downloads/"
          },
          {
            "name": "FEDORA-2022-7d46acce7c",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R36OYC5SJ6FLPVAYJYYT4MOJ2I7MGYFF/"
          },
          {
            "name": "FEDORA-2022-cb4c1146dc",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFXJ35WKPME4HYNQCQNAJHLCZOJL2SAE/"
          },
          {
            "name": "[debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-0547",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-23T13:27:37.639278Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-23T18:46:01.507Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "OpenVPN",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "version 2.1 until version 2.4.12 and 2.5.6."
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-305",
              "description": "CWE-305 - Authentication Bypass by Primary Weakness",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-03T13:06:11.000Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2022-0547"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://openvpn.net/community-downloads/"
        },
        {
          "name": "FEDORA-2022-7d46acce7c",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R36OYC5SJ6FLPVAYJYYT4MOJ2I7MGYFF/"
        },
        {
          "name": "FEDORA-2022-cb4c1146dc",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFXJ35WKPME4HYNQCQNAJHLCZOJL2SAE/"
        },
        {
          "name": "[debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@openvpn.net",
          "ID": "CVE-2022-0547",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "OpenVPN",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "version 2.1 until version 2.4.12 and 2.5.6."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-305 - Authentication Bypass by Primary Weakness"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements",
              "refsource": "MISC",
              "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
            },
            {
              "name": "https://community.openvpn.net/openvpn/wiki/CVE-2022-0547",
              "refsource": "MISC",
              "url": "https://community.openvpn.net/openvpn/wiki/CVE-2022-0547"
            },
            {
              "name": "https://openvpn.net/community-downloads/",
              "refsource": "MISC",
              "url": "https://openvpn.net/community-downloads/"
            },
            {
              "name": "FEDORA-2022-7d46acce7c",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R36OYC5SJ6FLPVAYJYYT4MOJ2I7MGYFF/"
            },
            {
              "name": "FEDORA-2022-cb4c1146dc",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFXJ35WKPME4HYNQCQNAJHLCZOJL2SAE/"
            },
            {
              "name": "[debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2022-0547",
    "datePublished": "2022-03-18T18:00:20.000Z",
    "dateReserved": "2022-02-08T00:00:00.000Z",
    "dateUpdated": "2025-04-23T18:46:01.507Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-7520 (GCVE-0-2017-7520)
Vulnerability from cvelistv5
Published
2017-06-27 13:00
Modified
2024-08-05 16:04
Severity ?
CWE
Summary
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker.
References
Impacted products
Vendor Product Version
OpenVPN Technologies, Inc OpenVPN Version: before 2.4.3
Version: before 2.3.17
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:04:11.764Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
          },
          {
            "name": "1038768",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038768"
          },
          {
            "name": "99230",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/99230"
          },
          {
            "name": "DSA-3900",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3900"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "OpenVPN",
          "vendor": "OpenVPN Technologies, Inc",
          "versions": [
            {
              "status": "affected",
              "version": "before 2.4.3"
            },
            {
              "status": "affected",
              "version": "before 2.3.17"
            }
          ]
        }
      ],
      "datePublic": "2017-06-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
        },
        {
          "name": "1038768",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038768"
        },
        {
          "name": "99230",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/99230"
        },
        {
          "name": "DSA-3900",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3900"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2017-7520",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "OpenVPN",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 2.4.3"
                          },
                          {
                            "version_value": "before 2.3.17"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "OpenVPN Technologies, Inc"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-200"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243",
              "refsource": "CONFIRM",
              "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
            },
            {
              "name": "1038768",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038768"
            },
            {
              "name": "99230",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/99230"
            },
            {
              "name": "DSA-3900",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3900"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2017-7520",
    "datePublished": "2017-06-27T13:00:00",
    "dateReserved": "2017-04-05T00:00:00",
    "dateUpdated": "2024-08-05T16:04:11.764Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-7235 (GCVE-0-2023-7235)
Vulnerability from cvelistv5
Published
2024-02-21 10:55
Modified
2024-08-26 16:13
CWE
  • CWE-276 - Incorrect Default Permissions
Summary
The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:57:35.194Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-7235"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "openvpn",
            "vendor": "openvpn",
            "versions": [
              {
                "lessThanOrEqual": "2.6.8",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 8.4,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-7235",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-26T16:50:36.232236Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-26T16:13:36.611Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "OpenVPN",
          "vendor": "OpenVPN",
          "versions": [
            {
              "lessThanOrEqual": "2.6.8",
              "status": "affected",
              "version": "0",
              "versionType": "all releases"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276: Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-21T10:55:15.487Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-7235"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2023-7235",
    "datePublished": "2024-02-21T10:55:15.487Z",
    "dateReserved": "2024-01-16T15:21:16.217Z",
    "dateUpdated": "2024-08-26T16:13:36.611Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2020-04-27 15:15
Modified
2024-11-21 04:58
Summary
An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.
References
cve@mitre.orghttps://bugzilla.suse.com/show_bug.cgi?id=1169925Issue Tracking, Third Party Advisory
cve@mitre.orghttps://community.openvpn.net/openvpn/ticket/1272Exploit, Vendor Advisory
cve@mitre.orghttps://github.com/OpenVPN/openvpn/commit/37bc691e7d26ea4eb61a8a434ebd7a9ae76225abPatch, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2022/05/msg00002.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGHHV4YZANZW45KZTJJGVGPFMSXYRCKZ/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JII7RYYYRBPQNEGGVSOXCM7JUZ43T3VH/
cve@mitre.orghttps://patchwork.openvpn.net/patch/1079/Patch, Vendor Advisory
cve@mitre.orghttps://security-tracker.debian.org/tracker/CVE-2020-11810Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.suse.com/show_bug.cgi?id=1169925Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://community.openvpn.net/openvpn/ticket/1272Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/OpenVPN/openvpn/commit/37bc691e7d26ea4eb61a8a434ebd7a9ae76225abPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2022/05/msg00002.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGHHV4YZANZW45KZTJJGVGPFMSXYRCKZ/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JII7RYYYRBPQNEGGVSOXCM7JUZ43T3VH/
af854a3a-2127-422b-91ae-364da2661108https://patchwork.openvpn.net/patch/1079/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://security-tracker.debian.org/tracker/CVE-2020-11810Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D4C2FC1-8BC0-4588-85C3-FC6D3B84D3F6",
              "versionEndExcluding": "2.4.9",
              "versionStartIncluding": "2.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim\u0027s peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim\u0027s connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un problema en OpenVPN versiones 2.4.x versiones anteriores a 2.4.9. Un atacante puede inyectar un paquete de canal de datos v2 (P_DATA_V2) usando el peer-id de la v\u00edctima. Normalmente, estos paquetes son eliminados, pero si este paquete llega antes de que se hayan inicializado los par\u00e1metros de cifrado del canal de datos, se eliminar\u00e1 la conexi\u00f3n de la v\u00edctima. Esto requiere una sincronizaci\u00f3n cuidadosa debido a una peque\u00f1a ventana de tiempo (normalmente unos pocos segundos) entre el inicio de la conexi\u00f3n del cliente v\u00edctima y la respuesta PUSH_REPLY del servidor al cliente. Este ataque s\u00f3lo funcionar\u00e1 si Negotiable Cipher Parameters (NCP) est\u00e1 en uso."
    }
  ],
  "id": "CVE-2020-11810",
  "lastModified": "2024-11-21T04:58:40.587",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 3.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-04-27T15:15:12.407",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.suse.com/show_bug.cgi?id=1169925"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/ticket/1272"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/OpenVPN/openvpn/commit/37bc691e7d26ea4eb61a8a434ebd7a9ae76225ab"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGHHV4YZANZW45KZTJJGVGPFMSXYRCKZ/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JII7RYYYRBPQNEGGVSOXCM7JUZ43T3VH/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://patchwork.openvpn.net/patch/1079/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2020-11810"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.suse.com/show_bug.cgi?id=1169925"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/ticket/1272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/OpenVPN/openvpn/commit/37bc691e7d26ea4eb61a8a434ebd7a9ae76225ab"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGHHV4YZANZW45KZTJJGVGPFMSXYRCKZ/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JII7RYYYRBPQNEGGVSOXCM7JUZ43T3VH/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://patchwork.openvpn.net/patch/1079/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2020-11810"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-11 01:15
Modified
2024-11-21 08:29
Severity ?
Summary
Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "3A398A7A-395F-4CA8-9D72-1DDD337D5074",
              "versionEndIncluding": "2.6.6",
              "versionStartIncluding": "2.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54464223-5988-40E7-B94B-D7B8DE999704",
              "versionEndIncluding": "2.11.3",
              "versionStartIncluding": "2.11.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B8D0B4E-A0BF-4A33-9031-987D8BD45F65",
              "versionEndExcluding": "2.12.2",
              "versionStartIncluding": "2.12.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer."
    },
    {
      "lang": "es",
      "value": "Use after free en OpenVPN versi\u00f3n 2.6.0 a 2.6.6 puede provocar un comportamiento indefinido, p\u00e9rdida de b\u00faferes de memoria o ejecuci\u00f3n remota al enviar b\u00faferes de red a un par remoto."
    }
  ],
  "id": "CVE-2023-46850",
  "lastModified": "2024-11-21T08:29:25.480",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-11T01:15:07.357",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-46850"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/"
    },
    {
      "source": "security@openvpn.net",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5555"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-46850"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5555"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-18 18:15
Modified
2025-04-23 19:15
Summary
OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.
References
security@openvpn.nethttps://community.openvpn.net/openvpn/wiki/CVE-2022-0547Vendor Advisory
security@openvpn.nethttps://community.openvpn.net/openvpn/wiki/SecurityAnnouncementsVendor Advisory
security@openvpn.nethttps://lists.debian.org/debian-lts-announce/2022/05/msg00002.htmlMailing List, Third Party Advisory
security@openvpn.nethttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFXJ35WKPME4HYNQCQNAJHLCZOJL2SAE/
security@openvpn.nethttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R36OYC5SJ6FLPVAYJYYT4MOJ2I7MGYFF/
security@openvpn.nethttps://openvpn.net/community-downloads/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://community.openvpn.net/openvpn/wiki/CVE-2022-0547Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://community.openvpn.net/openvpn/wiki/SecurityAnnouncementsVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2022/05/msg00002.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFXJ35WKPME4HYNQCQNAJHLCZOJL2SAE/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R36OYC5SJ6FLPVAYJYYT4MOJ2I7MGYFF/
af854a3a-2127-422b-91ae-364da2661108https://openvpn.net/community-downloads/Patch, Vendor Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DCBC37F-7869-42AE-B343-456FC9416C90",
              "versionEndExcluding": "2.4.12",
              "versionStartIncluding": "2.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "964D0D5A-F643-40FB-A051-E9DC5F859A1C",
              "versionEndExcluding": "2.5.6",
              "versionStartIncluding": "2.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials."
    },
    {
      "lang": "es",
      "value": "OpenVPN versiones 2.1 hasta v2.4.12 y versi\u00f3n v2.5.6, puede permitir una omisi\u00f3n de autenticaci\u00f3n en los complementos de autenticaci\u00f3n externa cuando m\u00e1s de uno de ellos hace uso de las respuestas de autenticaci\u00f3n diferida, lo que permite que sea concedido acceso a un usuario externo con credenciales s\u00f3lo parcialmente correctas"
    }
  ],
  "id": "CVE-2022-0547",
  "lastModified": "2025-04-23T19:15:52.743",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2022-03-18T18:15:12.017",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2022-0547"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
    },
    {
      "source": "security@openvpn.net",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFXJ35WKPME4HYNQCQNAJHLCZOJL2SAE/"
    },
    {
      "source": "security@openvpn.net",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R36OYC5SJ6FLPVAYJYYT4MOJ2I7MGYFF/"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/community-downloads/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2022-0547"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFXJ35WKPME4HYNQCQNAJHLCZOJL2SAE/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R36OYC5SJ6FLPVAYJYYT4MOJ2I7MGYFF/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/community-downloads/"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-305"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-05-01 18:29
Modified
2024-11-21 04:15
Summary
openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6562B69D-6751-4915-89C8-4675EFEEBB1A",
              "versionEndExcluding": "2.4.6",
              "versionStartIncluding": "2.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:slackware:slackware_linux:13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7547FBB1-AFE8-4DCB-9B6D-0EB719D26FB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:slackware:slackware_linux:13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "64DF28B6-C9FE-44AD-9D09-2F154819AFA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:slackware:slackware_linux:13.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A153230-E0BE-4323-AC73-44E8DCD14A1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:slackware:slackware_linux:14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "936EF68B-2A93-402C-BED4-20E6EDB2F102",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:slackware:slackware_linux:14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1B46F08-93A8-49D9-AC5D-43E19C062FFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation."
    },
    {
      "lang": "es",
      "value": "openvpnserv.exe (tambi\u00e9n conocido como interactive service helper) en OpenVPN en versiones 2.4.x anteriores a la 2.4.6 permite que un atacante local provoque una doble liberaci\u00f3n (double free) de memoria enviando una petici\u00f3n mal formada al servicio interactivo. Esto podr\u00eda provocar una denegaci\u00f3n de servicio (DoS) al corromper la memoria o, posiblemente, otro impacto no especificado, incluyendo el escalado de privilegios."
    }
  ],
  "id": "CVE-2018-9336",
  "lastModified": "2024-11-21T04:15:21.590",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-05-01T18:29:00.697",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2018\u0026m=slackware-security.568761"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/OpenVPN/openvpn/releases/tag/v2.4.6"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.tenable.com/security/research/tra-2018-09"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2018\u0026m=slackware-security.568761"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/OpenVPN/openvpn/releases/tag/v2.4.6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.tenable.com/security/research/tra-2018-09"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-415"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-07-08 22:15
Modified
2025-06-10 16:26
Summary
OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session
Impacted products
Vendor Product Version
openvpn openvpn *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "0D6C4FD9-4627-4A45-89FC-2DB53985C516",
              "versionEndExcluding": "2.6.11",
              "versionStartIncluding": "2.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session"
    },
    {
      "lang": "es",
      "value": "OpenVPN 2.6.10 y versiones anteriores en una funci\u00f3n de servidor aceptan m\u00faltiples notificaciones de salida de clientes autenticados que extender\u00e1n la validez de una sesi\u00f3n de cierre"
    }
  ],
  "id": "CVE-2024-28882",
  "lastModified": "2025-06-10T16:26:09.473",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-07-08T22:15:02.410",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-28882"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Mailing List"
      ],
      "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-28882"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-772"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-11-02 00:02
Modified
2025-04-03 01:03
Severity ?
Summary
OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.
References
cve@mitre.orghttp://openvpn.net/changelog.html
cve@mitre.orghttp://secunia.com/advisories/17376Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17447
cve@mitre.orghttp://secunia.com/advisories/17452
cve@mitre.orghttp://secunia.com/advisories/17480
cve@mitre.orghttp://www.debian.org/security/2005/dsa-885
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200511-07.xml
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_25_sr.html
cve@mitre.orghttp://www.osvdb.org/20416
cve@mitre.orghttp://www.securityfocus.com/archive/1/415487
cve@mitre.orghttp://www.securityfocus.com/bid/15270
af854a3a-2127-422b-91ae-364da2661108http://openvpn.net/changelog.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17376Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17447
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17452
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17480
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-885
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_25_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/20416
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/415487
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15270
Impacted products
Vendor Product Version
openvpn openvpn 2.0
openvpn openvpn 2.0.1_rc1
openvpn openvpn 2.0.1_rc2
openvpn openvpn 2.0.1_rc3
openvpn openvpn 2.0.1_rc4
openvpn openvpn 2.0.1_rc5
openvpn openvpn 2.0.1_rc6
openvpn openvpn 2.0.1_rc7
openvpn openvpn 2.0.2_rc1
openvpn openvpn 2.0.3_rc1
openvpn openvpn 2.0_beta1
openvpn openvpn 2.0_beta2
openvpn openvpn 2.0_beta3
openvpn openvpn 2.0_beta4
openvpn openvpn 2.0_beta5
openvpn openvpn 2.0_beta6
openvpn openvpn 2.0_beta7
openvpn openvpn 2.0_beta8
openvpn openvpn 2.0_beta9
openvpn openvpn 2.0_beta10
openvpn openvpn 2.0_beta11
openvpn openvpn 2.0_beta12
openvpn openvpn 2.0_beta13
openvpn openvpn 2.0_beta15
openvpn openvpn 2.0_beta16
openvpn openvpn 2.0_beta17
openvpn openvpn 2.0_beta18
openvpn openvpn 2.0_beta19
openvpn openvpn 2.0_beta20
openvpn openvpn 2.0_beta28
openvpn openvpn 2.0_rc1
openvpn openvpn 2.0_rc2
openvpn openvpn 2.0_rc3
openvpn openvpn 2.0_rc4
openvpn openvpn 2.0_rc5
openvpn openvpn 2.0_rc6
openvpn openvpn 2.0_rc7
openvpn openvpn 2.0_rc8
openvpn openvpn 2.0_rc9
openvpn openvpn 2.0_rc10
openvpn openvpn 2.0_rc11
openvpn openvpn 2.0_rc12
openvpn openvpn 2.0_rc13
openvpn openvpn 2.0_rc14
openvpn openvpn 2.0_rc15
openvpn openvpn 2.0_rc16
openvpn openvpn 2.0_rc17
openvpn openvpn 2.0_rc18
openvpn openvpn 2.0_rc19
openvpn openvpn 2.0_rc20
openvpn openvpn 2.0_rc21
openvpn openvpn 2.0_test1
openvpn openvpn 2.0_test2
openvpn openvpn 2.0_test3
openvpn openvpn 2.0_test5
openvpn openvpn 2.0_test6
openvpn openvpn 2.0_test7
openvpn openvpn 2.0_test8
openvpn openvpn 2.0_test9
openvpn openvpn 2.0_test10
openvpn openvpn 2.0_test11
openvpn openvpn 2.0_test12
openvpn openvpn 2.0_test14
openvpn openvpn 2.0_test15
openvpn openvpn 2.0_test16
openvpn openvpn 2.0_test17
openvpn openvpn 2.0_test18
openvpn openvpn 2.0_test19
openvpn openvpn 2.0_test20
openvpn openvpn 2.0_test21
openvpn openvpn 2.0_test22
openvpn openvpn 2.0_test23
openvpn openvpn 2.0_test24
openvpn openvpn 2.0_test26
openvpn openvpn 2.0_test27
openvpn openvpn 2.0_test29
openvpn openvpn_access_server 2.0.1
openvpn openvpn_access_server 2.0.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6457C946-123B-4B85-9253-D284A7A16A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0ECEAF-401A-434E-9B0A-1A234BAEFC4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E751FA0E-0DF4-4F81-912A-1A132640246D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F61AC6-EDF6-4818-BA51-3EAA299680B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32984D8-9631-407B-834E-303B9405A425",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB44A872-3FE2-47E9-BA84-B6E1015E1973",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F020080D-7181-400D-988E-6844D1653464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D08038-9815-4222-9CD3-1211FE5954A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.2_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE43EA96-5B3C-498F-A040-C800821DA49B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.3_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "236F2BBF-0CF5-465E-9E65-8AD6D17F57A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BDEBEDA-437A-4942-8A71-7B25DD558BCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EB8A78E-DAB9-4A72-BC54-58230E1E9B9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5D74ED1-34C5-4F95-A941-83664AFFF2ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0747C1A9-C404-4FBD-AA8F-9DBB70FEB4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3B1AD4-9EA0-4D86-90E1-3366FBC5629D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E483BD0-CAB9-4DA0-AAA4-A934B8318FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F04FAB1-A558-4F93-9FBF-043DE259A813",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A189A733-3130-41B4-94DD-E99E294D0FBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DEE5695-DC49-445D-864A-4739E16DF762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FBF146F-2CFA-4F14-BFBC-E01B58F9F72B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D263CA-8B2C-4B66-8990-6224BAF52A8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta12:*:*:*:*:*:*:*",
              "matchCriteriaId": "825C9FCE-AD76-4E32-8FEC-EEFA0662BC04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7519FA-831A-41D7-AFC3-B9457E6DFB4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta15:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB79AFD-493F-41F1-9EC1-8BCC0D28A914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C8F091B-194A-4FC5-87F4-A76CB490F3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11716B49-A920-4A1B-BEA5-4105213B9731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta18:*:*:*:*:*:*:*",
              "matchCriteriaId": "756A7AF5-E502-4EDC-9693-4041C993E3BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta19:*:*:*:*:*:*:*",
              "matchCriteriaId": "9885BC3E-1854-4561-9906-FFAEECA5B6FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7B7759F-F228-436D-BC86-7317B0109C02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta28:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB9BD19-1BF9-42D0-9E43-7D95EE010347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0A6E23-6456-4305-A7DA-8CA1D506D4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D985B9F0-5B4F-4120-8ECF-506C5F6179FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF7E6096-58BF-47F1-982B-27A9ED735AEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "62362541-FE20-47ED-9E03-94216A3D43CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BD7019-BBA5-4D08-85C8-571D2EC03FA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1D56A4-A03C-445C-993B-1AA12024D4FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F563B1FD-FC1F-4304-8141-A1188A190835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4269ED1A-3031-4572-B134-62C6E533D176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc9:*:*:*:*:*:*:*",
              "matchCriteriaId": "140999A7-E9BB-4459-B3F8-48DF8F5DFE0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41CD75B0-24D0-40BA-A4FB-925BD5414298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc11:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED8F3C5-8E43-4B07-8224-38BF4774F4CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC88614-E782-447B-B854-955498FAAA13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C1B8EE-3C12-452F-986E-6FD8A230685A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc14:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AC6851-F63E-47D7-BDEF-3BFF39E94D9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc15:*:*:*:*:*:*:*",
              "matchCriteriaId": "685F5555-793D-4FAA-8CF4-578490CFAC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E688CF0C-134B-49E2-AEB3-45ECACB8B5FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D385327-D1FF-4A22-A0C0-0C5AA53590C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc18:*:*:*:*:*:*:*",
              "matchCriteriaId": "51329755-1DBF-40E1-960C-E924CDC4B22C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc19:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE65AC5-C218-456F-86FB-1C8BEC3C4598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1412133F-3B44-43B6-A4FF-FF80E7B564E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B55EE355-28A1-4955-9ADD-A8E02376C9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E942C13E-6B54-465F-8026-ED49BD7EA2F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AADF30CF-AD36-45EB-AF50-EB0533B20B70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD078F82-361C-4B38-86E8-85E129F41A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9831C92-7717-4650-8689-3C41B773C5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3521E7-572E-4ADD-AAF6-F1AE505B4BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73290B2-384B-4B0F-8763-EF4D5D7C39FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4728B3CD-5B54-4B0B-8967-DE7D9E1474F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F353B495-D69A-4831-9E5B-F15F8F749C84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16647409-3ADD-4E86-A053-4A7B8365700E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5CA9F6-68FE-4412-8CD5-F85E970249F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test12:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A74354-1EAB-4A4F-A79C-C04E9BCDF594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test14:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A016A3-CAA9-4FCB-B909-F4163CE1E19E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test15:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A53B7C-8E9D-4DD6-8B00-628F7796A365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D5AADA5-05DA-4660-9636-A3B737916A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test17:*:*:*:*:*:*:*",
              "matchCriteriaId": "2778FEDE-063B-4454-9FA7-F526334CF9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test18:*:*:*:*:*:*:*",
              "matchCriteriaId": "989D471D-3F81-4018-A124-7FBEB3F4AB87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test19:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4EA97AE-B2DD-40F8-81E1-467E895CE736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C82A6A-4548-4508-B337-1061E57D78AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test21:*:*:*:*:*:*:*",
              "matchCriteriaId": "36A972BC-6956-4195-933C-F3694BFEFB50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EF5187-C008-4927-B5CB-A491768E9822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test23:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A39ECE-7C8D-4BB8-A408-08EA0879F03F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test24:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C67474C-3274-4F62-AF98-6953F9744522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test26:*:*:*:*:*:*:*",
              "matchCriteriaId": "D799CAF5-BFC3-4A80-8AE2-D292B7F9D9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test27:*:*:*:*:*:*:*",
              "matchCriteriaId": "98D3B905-FCD7-4136-A94C-76A95994CD85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE172A1-D9A5-4FF7-B316-4E0BD639B35D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B42CB75B-355B-4D80-91EA-77723B275D0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E5EFEC7-D9B6-454A-A36A-C75874564FCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler."
    }
  ],
  "id": "CVE-2005-3409",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-11-02T00:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://openvpn.net/changelog.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17376"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17447"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17452"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17480"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-885"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/20416"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/415487"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openvpn.net/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17376"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17447"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17452"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17480"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-885"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/20416"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/415487"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15270"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-08-24 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses.
Impacted products
Vendor Product Version
openvpn openvpn 2.0
openvpn openvpn 2.0.1_rc1
openvpn openvpn 2.0.1_rc2
openvpn openvpn 2.0.1_rc3
openvpn openvpn 2.0.1_rc4
openvpn openvpn 2.0.1_rc5
openvpn openvpn 2.0.1_rc6
openvpn openvpn 2.0.1_rc7
openvpn openvpn 2.0_beta1
openvpn openvpn 2.0_beta2
openvpn openvpn 2.0_beta3
openvpn openvpn 2.0_beta4
openvpn openvpn 2.0_beta5
openvpn openvpn 2.0_beta6
openvpn openvpn 2.0_beta7
openvpn openvpn 2.0_beta8
openvpn openvpn 2.0_beta9
openvpn openvpn 2.0_beta10
openvpn openvpn 2.0_beta11
openvpn openvpn 2.0_beta12
openvpn openvpn 2.0_beta13
openvpn openvpn 2.0_beta15
openvpn openvpn 2.0_beta16
openvpn openvpn 2.0_beta17
openvpn openvpn 2.0_beta18
openvpn openvpn 2.0_beta19
openvpn openvpn 2.0_beta20
openvpn openvpn 2.0_beta28
openvpn openvpn 2.0_rc1
openvpn openvpn 2.0_rc2
openvpn openvpn 2.0_rc3
openvpn openvpn 2.0_rc4
openvpn openvpn 2.0_rc5
openvpn openvpn 2.0_rc6
openvpn openvpn 2.0_rc7
openvpn openvpn 2.0_rc8
openvpn openvpn 2.0_rc9
openvpn openvpn 2.0_rc10
openvpn openvpn 2.0_rc11
openvpn openvpn 2.0_rc12
openvpn openvpn 2.0_rc13
openvpn openvpn 2.0_rc14
openvpn openvpn 2.0_rc15
openvpn openvpn 2.0_rc16
openvpn openvpn 2.0_rc17
openvpn openvpn 2.0_rc18
openvpn openvpn 2.0_rc19
openvpn openvpn 2.0_rc20
openvpn openvpn 2.0_rc21
openvpn openvpn 2.0_test1
openvpn openvpn 2.0_test2
openvpn openvpn 2.0_test3
openvpn openvpn 2.0_test5
openvpn openvpn 2.0_test6
openvpn openvpn 2.0_test7
openvpn openvpn 2.0_test8
openvpn openvpn 2.0_test9
openvpn openvpn 2.0_test10
openvpn openvpn 2.0_test11
openvpn openvpn 2.0_test12
openvpn openvpn 2.0_test14
openvpn openvpn 2.0_test15
openvpn openvpn 2.0_test16
openvpn openvpn 2.0_test17
openvpn openvpn 2.0_test18
openvpn openvpn 2.0_test19
openvpn openvpn 2.0_test20
openvpn openvpn 2.0_test21
openvpn openvpn 2.0_test22
openvpn openvpn 2.0_test23
openvpn openvpn 2.0_test24
openvpn openvpn 2.0_test26
openvpn openvpn 2.0_test27
openvpn openvpn 2.0_test29



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6457C946-123B-4B85-9253-D284A7A16A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0ECEAF-401A-434E-9B0A-1A234BAEFC4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E751FA0E-0DF4-4F81-912A-1A132640246D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F61AC6-EDF6-4818-BA51-3EAA299680B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32984D8-9631-407B-834E-303B9405A425",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB44A872-3FE2-47E9-BA84-B6E1015E1973",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F020080D-7181-400D-988E-6844D1653464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D08038-9815-4222-9CD3-1211FE5954A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BDEBEDA-437A-4942-8A71-7B25DD558BCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EB8A78E-DAB9-4A72-BC54-58230E1E9B9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5D74ED1-34C5-4F95-A941-83664AFFF2ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0747C1A9-C404-4FBD-AA8F-9DBB70FEB4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3B1AD4-9EA0-4D86-90E1-3366FBC5629D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E483BD0-CAB9-4DA0-AAA4-A934B8318FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F04FAB1-A558-4F93-9FBF-043DE259A813",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A189A733-3130-41B4-94DD-E99E294D0FBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DEE5695-DC49-445D-864A-4739E16DF762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FBF146F-2CFA-4F14-BFBC-E01B58F9F72B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D263CA-8B2C-4B66-8990-6224BAF52A8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta12:*:*:*:*:*:*:*",
              "matchCriteriaId": "825C9FCE-AD76-4E32-8FEC-EEFA0662BC04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7519FA-831A-41D7-AFC3-B9457E6DFB4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta15:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB79AFD-493F-41F1-9EC1-8BCC0D28A914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C8F091B-194A-4FC5-87F4-A76CB490F3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11716B49-A920-4A1B-BEA5-4105213B9731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta18:*:*:*:*:*:*:*",
              "matchCriteriaId": "756A7AF5-E502-4EDC-9693-4041C993E3BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta19:*:*:*:*:*:*:*",
              "matchCriteriaId": "9885BC3E-1854-4561-9906-FFAEECA5B6FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7B7759F-F228-436D-BC86-7317B0109C02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta28:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB9BD19-1BF9-42D0-9E43-7D95EE010347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0A6E23-6456-4305-A7DA-8CA1D506D4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D985B9F0-5B4F-4120-8ECF-506C5F6179FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF7E6096-58BF-47F1-982B-27A9ED735AEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "62362541-FE20-47ED-9E03-94216A3D43CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BD7019-BBA5-4D08-85C8-571D2EC03FA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1D56A4-A03C-445C-993B-1AA12024D4FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F563B1FD-FC1F-4304-8141-A1188A190835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4269ED1A-3031-4572-B134-62C6E533D176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc9:*:*:*:*:*:*:*",
              "matchCriteriaId": "140999A7-E9BB-4459-B3F8-48DF8F5DFE0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41CD75B0-24D0-40BA-A4FB-925BD5414298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc11:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED8F3C5-8E43-4B07-8224-38BF4774F4CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC88614-E782-447B-B854-955498FAAA13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C1B8EE-3C12-452F-986E-6FD8A230685A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc14:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AC6851-F63E-47D7-BDEF-3BFF39E94D9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc15:*:*:*:*:*:*:*",
              "matchCriteriaId": "685F5555-793D-4FAA-8CF4-578490CFAC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E688CF0C-134B-49E2-AEB3-45ECACB8B5FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D385327-D1FF-4A22-A0C0-0C5AA53590C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc18:*:*:*:*:*:*:*",
              "matchCriteriaId": "51329755-1DBF-40E1-960C-E924CDC4B22C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc19:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE65AC5-C218-456F-86FB-1C8BEC3C4598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1412133F-3B44-43B6-A4FF-FF80E7B564E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B55EE355-28A1-4955-9ADD-A8E02376C9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E942C13E-6B54-465F-8026-ED49BD7EA2F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AADF30CF-AD36-45EB-AF50-EB0533B20B70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD078F82-361C-4B38-86E8-85E129F41A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9831C92-7717-4650-8689-3C41B773C5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3521E7-572E-4ADD-AAF6-F1AE505B4BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73290B2-384B-4B0F-8763-EF4D5D7C39FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4728B3CD-5B54-4B0B-8967-DE7D9E1474F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F353B495-D69A-4831-9E5B-F15F8F749C84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16647409-3ADD-4E86-A053-4A7B8365700E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5CA9F6-68FE-4412-8CD5-F85E970249F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test12:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A74354-1EAB-4A4F-A79C-C04E9BCDF594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test14:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A016A3-CAA9-4FCB-B909-F4163CE1E19E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test15:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A53B7C-8E9D-4DD6-8B00-628F7796A365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D5AADA5-05DA-4660-9636-A3B737916A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test17:*:*:*:*:*:*:*",
              "matchCriteriaId": "2778FEDE-063B-4454-9FA7-F526334CF9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test18:*:*:*:*:*:*:*",
              "matchCriteriaId": "989D471D-3F81-4018-A124-7FBEB3F4AB87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test19:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4EA97AE-B2DD-40F8-81E1-467E895CE736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C82A6A-4548-4508-B337-1061E57D78AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test21:*:*:*:*:*:*:*",
              "matchCriteriaId": "36A972BC-6956-4195-933C-F3694BFEFB50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EF5187-C008-4927-B5CB-A491768E9822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test23:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A39ECE-7C8D-4BB8-A408-08EA0879F03F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test24:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C67474C-3274-4F62-AF98-6953F9744522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test26:*:*:*:*:*:*:*",
              "matchCriteriaId": "D799CAF5-BFC3-4A80-8AE2-D292B7F9D9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test27:*:*:*:*:*:*:*",
              "matchCriteriaId": "98D3B905-FCD7-4136-A94C-76A95994CD85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE172A1-D9A5-4FF7-B316-4E0BD639B35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN before 2.0.1, when running in \"dev tap\" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses."
    }
  ],
  "id": "CVE-2005-2533",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-24T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://openvpn.net/changelog.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/16463"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17103"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-851"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openvpn.net/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/16463"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17103"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-12-03 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
Impacted products
Vendor Product Version
mageia mageia 4.0
debian debian_linux 7.0
debian debian_linux 8.0
opensuse opensuse 12.3
opensuse opensuse 13.1
opensuse opensuse 13.2
openvpn openvpn 2.0.1_rc1
openvpn openvpn 2.0.1_rc2
openvpn openvpn 2.0.1_rc3
openvpn openvpn 2.0.1_rc4
openvpn openvpn 2.0.1_rc5
openvpn openvpn 2.0.1_rc6
openvpn openvpn 2.0.1_rc7
openvpn openvpn 2.0.2_rc1
openvpn openvpn 2.0.3_rc1
openvpn openvpn 2.0.4
openvpn openvpn 2.0.6_rc1
openvpn openvpn 2.0.9
openvpn openvpn 2.0_rc1
openvpn openvpn 2.0_rc2
openvpn openvpn 2.0_rc3
openvpn openvpn 2.0_rc4
openvpn openvpn 2.0_rc5
openvpn openvpn 2.0_rc6
openvpn openvpn 2.0_rc7
openvpn openvpn 2.0_rc8
openvpn openvpn 2.0_rc9
openvpn openvpn 2.0_rc10
openvpn openvpn 2.0_rc11
openvpn openvpn 2.0_rc12
openvpn openvpn 2.0_rc13
openvpn openvpn 2.0_rc14
openvpn openvpn 2.0_rc15
openvpn openvpn 2.0_rc16
openvpn openvpn 2.0_rc17
openvpn openvpn 2.0_rc18
openvpn openvpn 2.0_rc19
openvpn openvpn 2.0_rc20
openvpn openvpn 2.0_rc21
openvpn openvpn 2.0_test1
openvpn openvpn 2.0_test2
openvpn openvpn 2.0_test3
openvpn openvpn 2.0_test4
openvpn openvpn 2.0_test5
openvpn openvpn 2.0_test6
openvpn openvpn 2.0_test7
openvpn openvpn 2.0_test8
openvpn openvpn 2.0_test9
openvpn openvpn 2.0_test10
openvpn openvpn 2.0_test11
openvpn openvpn 2.0_test12
openvpn openvpn 2.0_test14
openvpn openvpn 2.0_test15
openvpn openvpn 2.0_test16
openvpn openvpn 2.0_test17
openvpn openvpn 2.0_test18
openvpn openvpn 2.0_test19
openvpn openvpn 2.0_test20
openvpn openvpn 2.0_test21
openvpn openvpn 2.0_test22
openvpn openvpn 2.0_test23
openvpn openvpn 2.0_test24
openvpn openvpn 2.0_test25
openvpn openvpn 2.0_test26
openvpn openvpn 2.0_test27
openvpn openvpn 2.0_test28
openvpn openvpn 2.0_test29
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1
openvpn openvpn 2.1.0
openvpn openvpn 2.1.1
openvpn openvpn 2.1.2
openvpn openvpn 2.1.3
openvpn openvpn 2.1.4
openvpn openvpn 2.2
openvpn openvpn 2.2
openvpn openvpn 2.2
openvpn openvpn 2.2
openvpn openvpn 2.2
openvpn openvpn 2.2.0
openvpn openvpn 2.2.1
openvpn openvpn 2.2.2
openvpn openvpn 2.3
openvpn openvpn 2.3
openvpn openvpn 2.3
openvpn openvpn 2.3
openvpn openvpn 2.3
openvpn openvpn 2.3
openvpn openvpn 2.3.0
openvpn openvpn 2.3.1
openvpn openvpn 2.3.2
openvpn openvpn 2.3.3
openvpn openvpn 2.3.4
openvpn openvpn 2.3.5
openvpn openvpn_access_server 2.0.0
openvpn openvpn_access_server 2.0.1
openvpn openvpn_access_server 2.0.2
openvpn openvpn_access_server 2.0.3
openvpn openvpn_access_server 2.0.5
openvpn openvpn_access_server 2.0.6
openvpn openvpn_access_server 2.0.7
openvpn openvpn_access_server 2.0.8
openvpn openvpn_access_server 2.0.10
canonical ubuntu_linux 12.04
canonical ubuntu_linux 14.04
canonical ubuntu_linux 14.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F805A106-9A6F-48E7-8582-D3C5A26DFC11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0ECEAF-401A-434E-9B0A-1A234BAEFC4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E751FA0E-0DF4-4F81-912A-1A132640246D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F61AC6-EDF6-4818-BA51-3EAA299680B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32984D8-9631-407B-834E-303B9405A425",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB44A872-3FE2-47E9-BA84-B6E1015E1973",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F020080D-7181-400D-988E-6844D1653464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D08038-9815-4222-9CD3-1211FE5954A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.2_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE43EA96-5B3C-498F-A040-C800821DA49B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.3_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "236F2BBF-0CF5-465E-9E65-8AD6D17F57A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DF6B1F4-6313-4BF4-AD87-431A1C9D40C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.6_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA031086-95E4-4447-A06B-3B2926E3265F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD8ABC0A-80F7-4B7A-9D0A-015C53D1A1B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0A6E23-6456-4305-A7DA-8CA1D506D4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D985B9F0-5B4F-4120-8ECF-506C5F6179FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF7E6096-58BF-47F1-982B-27A9ED735AEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "62362541-FE20-47ED-9E03-94216A3D43CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BD7019-BBA5-4D08-85C8-571D2EC03FA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1D56A4-A03C-445C-993B-1AA12024D4FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F563B1FD-FC1F-4304-8141-A1188A190835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4269ED1A-3031-4572-B134-62C6E533D176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc9:*:*:*:*:*:*:*",
              "matchCriteriaId": "140999A7-E9BB-4459-B3F8-48DF8F5DFE0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41CD75B0-24D0-40BA-A4FB-925BD5414298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc11:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED8F3C5-8E43-4B07-8224-38BF4774F4CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC88614-E782-447B-B854-955498FAAA13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C1B8EE-3C12-452F-986E-6FD8A230685A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc14:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AC6851-F63E-47D7-BDEF-3BFF39E94D9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc15:*:*:*:*:*:*:*",
              "matchCriteriaId": "685F5555-793D-4FAA-8CF4-578490CFAC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E688CF0C-134B-49E2-AEB3-45ECACB8B5FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D385327-D1FF-4A22-A0C0-0C5AA53590C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc18:*:*:*:*:*:*:*",
              "matchCriteriaId": "51329755-1DBF-40E1-960C-E924CDC4B22C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc19:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE65AC5-C218-456F-86FB-1C8BEC3C4598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1412133F-3B44-43B6-A4FF-FF80E7B564E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B55EE355-28A1-4955-9ADD-A8E02376C9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E942C13E-6B54-465F-8026-ED49BD7EA2F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AADF30CF-AD36-45EB-AF50-EB0533B20B70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD078F82-361C-4B38-86E8-85E129F41A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test4:*:*:*:*:*:*:*",
              "matchCriteriaId": "09ADBC1B-7835-4D63-AA86-EF056E008F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9831C92-7717-4650-8689-3C41B773C5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3521E7-572E-4ADD-AAF6-F1AE505B4BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73290B2-384B-4B0F-8763-EF4D5D7C39FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4728B3CD-5B54-4B0B-8967-DE7D9E1474F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F353B495-D69A-4831-9E5B-F15F8F749C84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16647409-3ADD-4E86-A053-4A7B8365700E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5CA9F6-68FE-4412-8CD5-F85E970249F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test12:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A74354-1EAB-4A4F-A79C-C04E9BCDF594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test14:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A016A3-CAA9-4FCB-B909-F4163CE1E19E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test15:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A53B7C-8E9D-4DD6-8B00-628F7796A365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D5AADA5-05DA-4660-9636-A3B737916A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test17:*:*:*:*:*:*:*",
              "matchCriteriaId": "2778FEDE-063B-4454-9FA7-F526334CF9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test18:*:*:*:*:*:*:*",
              "matchCriteriaId": "989D471D-3F81-4018-A124-7FBEB3F4AB87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test19:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4EA97AE-B2DD-40F8-81E1-467E895CE736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C82A6A-4548-4508-B337-1061E57D78AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test21:*:*:*:*:*:*:*",
              "matchCriteriaId": "36A972BC-6956-4195-933C-F3694BFEFB50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EF5187-C008-4927-B5CB-A491768E9822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test23:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A39ECE-7C8D-4BB8-A408-08EA0879F03F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test24:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C67474C-3274-4F62-AF98-6953F9744522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test25:*:*:*:*:*:*:*",
              "matchCriteriaId": "5196B669-CF0F-4FED-9EAF-72F335436BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test26:*:*:*:*:*:*:*",
              "matchCriteriaId": "D799CAF5-BFC3-4A80-8AE2-D292B7F9D9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test27:*:*:*:*:*:*:*",
              "matchCriteriaId": "98D3B905-FCD7-4136-A94C-76A95994CD85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test28:*:*:*:*:*:*:*",
              "matchCriteriaId": "F696A07E-ECE3-4010-A908-A006C85EECCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE172A1-D9A5-4FF7-B316-4E0BD639B35D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-1:*:*:*:*:*:*",
              "matchCriteriaId": "8459B597-7229-446D-905D-B1528AE72A48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-10:*:*:*:*:*:*",
              "matchCriteriaId": "70873B7B-C431-4D21-81FE-C5DB695E51A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-11:*:*:*:*:*:*",
              "matchCriteriaId": "6841F4A3-DFF8-48A7-A88B-52C71DB19096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-12:*:*:*:*:*:*",
              "matchCriteriaId": "DBAECB05-74F1-410E-B2D4-6B789D275BFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-13:*:*:*:*:*:*",
              "matchCriteriaId": "D1BCCE52-CFC5-4EED-8A1F-12649A1F0ED2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-14:*:*:*:*:*:*",
              "matchCriteriaId": "C6826F2C-9769-4F70-8121-988986C9DAFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-15:*:*:*:*:*:*",
              "matchCriteriaId": "38CDC26A-2EA1-4FD1-BE82-09ABE335A778",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-16:*:*:*:*:*:*",
              "matchCriteriaId": "F4284CC6-B78D-478D-B815-3FB4D884A726",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-2:*:*:*:*:*:*",
              "matchCriteriaId": "453245EF-965E-4F93-83D3-48B90FE48A6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-3:*:*:*:*:*:*",
              "matchCriteriaId": "EF5EC30A-3DC5-4E7A-836C-8664F716416C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-4:*:*:*:*:*:*",
              "matchCriteriaId": "2678B55D-319C-43F6-B728-7A321D4B3209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-5:*:*:*:*:*:*",
              "matchCriteriaId": "E35E44F6-BEBB-4042-83D2-A7EA0973741D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-6:*:*:*:*:*:*",
              "matchCriteriaId": "FAE85542-1693-4DC6-9948-7255E4773BA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-7:*:*:*:*:*:*",
              "matchCriteriaId": "7D1C661A-5BD4-4BC3-88E8-31412B8160F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-8:*:*:*:*:*:*",
              "matchCriteriaId": "2EEF3348-775A-4DE0-AAF0-482B91A3AC40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-9:*:*:*:*:*:*",
              "matchCriteriaId": "82269255-618E-43DC-9486-B17A790844F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_1:*:*:*:*:*:*",
              "matchCriteriaId": "F972B6E6-0553-454E-BF58-107E7A9EC9E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_10:*:*:*:*:*:*",
              "matchCriteriaId": "973BB008-9779-4F7F-8759-1266430EE01F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_11:*:*:*:*:*:*",
              "matchCriteriaId": "5DC24D46-CD48-480E-862E-AF2E4D6BEECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_12:*:*:*:*:*:*",
              "matchCriteriaId": "AD17C1C3-73FF-4B96-8E90-73D64A59A02F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_13:*:*:*:*:*:*",
              "matchCriteriaId": "86DCBDE1-C3D8-4E1A-85B1-E82D4957434A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_14:*:*:*:*:*:*",
              "matchCriteriaId": "1A939316-AAB3-4731-9CBF-C4FB103EF69C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_15:*:*:*:*:*:*",
              "matchCriteriaId": "97EEF414-D6EF-4DA4-809A-CC4D795EC4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_16:*:*:*:*:*:*",
              "matchCriteriaId": "C7E98A8B-D506-46EB-A013-6E992245BB06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_17:*:*:*:*:*:*",
              "matchCriteriaId": "062BBC75-316A-4A75-B013-C65575BA1879",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_18:*:*:*:*:*:*",
              "matchCriteriaId": "21364ECB-DBA6-4222-8138-7367971621B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_19:*:*:*:*:*:*",
              "matchCriteriaId": "A72074A1-9296-40AE-A456-97FEA13B1FC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_2:*:*:*:*:*:*",
              "matchCriteriaId": "9DBF4843-5E4F-4C47-BBF8-4ADB45C422E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_20:*:*:*:*:*:*",
              "matchCriteriaId": "736E4AF6-126C-4521-983A-36599E658BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_21:*:*:*:*:*:*",
              "matchCriteriaId": "199F38E7-44A5-47DE-AE71-E04D06B456CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_22:*:*:*:*:*:*",
              "matchCriteriaId": "6495D598-AF9E-4258-A193-32712D3B4340",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_3:*:*:*:*:*:*",
              "matchCriteriaId": "61BB61B4-2769-4F59-875F-9269C551E386",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_4:*:*:*:*:*:*",
              "matchCriteriaId": "DBD947CF-98BC-4C84-8149-B4EEFF1015AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_5:*:*:*:*:*:*",
              "matchCriteriaId": "FE621907-2D6B-4558-A9B9-E98AAF236D59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_6:*:*:*:*:*:*",
              "matchCriteriaId": "B57458F3-B8F9-454E-98B1-9FA33ABDF0BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_7:*:*:*:*:*:*",
              "matchCriteriaId": "42F0E1FF-0863-418C-BD26-F3B18B257370",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_8:*:*:*:*:*:*",
              "matchCriteriaId": "B0E905D4-34F6-4ACD-8D86-0C9E29EDB282",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_9:*:*:*:*:*:*",
              "matchCriteriaId": "201BAAB4-181A-45CF-8800-AEFA3AFC44DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "88C2922E-6E95-45BF-ABF1-B1D799769DB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A74DA07-5725-46B5-BC90-B1B2A2562E15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "83495B90-FD8D-453B-B39E-B6630BC9E1F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E027B8-5D0D-4DA3-8D25-FAC2CAAE971C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5A241E3-1F25-48C9-A49F-6F9E805E7732",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.2:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "2FD8F84B-583A-4605-B939-75E90B28AAE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.2:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "7C996321-0770-4949-B627-EFD23CA54DED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.2:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "0863345A-59FC-4FE9-AC18-4949B69FC8F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.2:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D7559EF0-C9C5-4D1A-BED3-8DC10A1FA0D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.2:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "7557FBEB-9F01-482A-BD92-E4636216B278",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D915A07-3B93-4D7C-8D52-73B696392B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E75645E-829A-414B-9758-33E68C397D07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB4ED809-BBE7-4D82-BBB8-CF47134B676B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "2CAF2208-8204-4747-BCD7-0640E8D37DF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "C52337EC-B6F2-4D24-946B-2BC0F7AB289B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "7ECE3870-15C5-444D-8791-C95E3154B6F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "73308E91-F884-41BF-8B6F-D5ECA69BC622",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EEE9B244-7B5D-4089-8DF9-4618340EB09C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "A3CF7B64-4C8E-482A-8D54-9033234322E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0001EA6-8B77-474F-AB96-B64BE06F9071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "311B464F-A8B0-4258-86E5-05CBE0CBCACF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "77D50828-4D5C-4EDD-960E-C59F13ED64A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D15C3021-8F17-4869-ACFB-E567000ECE7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "68F52EAE-E3B5-4186-A11C-A481F54B79C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF9F2DF9-3E2B-4B31-8735-334EECB6F6A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "486CD3E2-1B1A-4A1D-98ED-0E2EEAB0A0CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B42CB75B-355B-4D80-91EA-77723B275D0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E5EFEC7-D9B6-454A-A36A-C75874564FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "21846206-4CF3-426F-9BE7-93471987BC06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED93D78-3BA8-43DB-B5AF-D2D3941C9DAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2B16482-8058-46A8-9D56-DB73BFE32A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105F380-57BF-44BD-B31D-9D36DF9210A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C802FAF2-EAB3-4C79-B1D1-D27C8D5CEE63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF722539-0A07-4C74-85F0-342195714D2B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet."
    },
    {
      "lang": "es",
      "value": "OpenVPN 2.x anterior a 2.0.11, 2.1.x, 2.2.x anterior a 2.2.3, y 2.3.x anterior a 2.3.6 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (ca\u00edda del servidor) a trav\u00e9s de un paquete de canal de control peque\u00f1o."
    }
  ],
  "id": "CVE-2014-8104",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-12-03T18:59:00.063",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://advisories.mageia.org/MGASA-2014-0512.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00008.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2014/dsa-3084"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:139"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2430-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://advisories.mageia.org/MGASA-2014-0512.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2014/dsa-3084"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2430-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-10-04 01:29
Modified
2025-04-20 01:37
Severity ?
Summary
OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.
Impacted products
Vendor Product Version
openvpn openvpn *
openvpn openvpn *
debian debian_linux 9.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5DD8899-640F-42F3-A82F-ACC4D2529C95",
              "versionEndExcluding": "2.3.18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BC52F79-A9F0-45FE-9EC0-58E970E4B3B1",
              "versionEndExcluding": "2.4.4",
              "versionStartIncluding": "2.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution."
    },
    {
      "lang": "es",
      "value": "OpenVPN en versiones anteriores a la 2.3.3 y en versiones 2.4.x anteriores a la 2.4.4 es vulnerable a undesbordamiento de b\u00fafer cuando se utiliza key-method 1, lo que puede provocar la ejecuci\u00f3n de c\u00f3digo."
    }
  ],
  "id": "CVE-2017-12166",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-10-04T01:29:02.090",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry",
        "URL Repurposed"
      ],
      "url": "http://www.securityfocus.com/bid/101153"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry",
        "URL Repurposed"
      ],
      "url": "http://www.securitytracker.com/id/1039470"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2017-12166"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry",
        "URL Repurposed"
      ],
      "url": "http://www.securityfocus.com/bid/101153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry",
        "URL Repurposed"
      ],
      "url": "http://www.securitytracker.com/id/1039470"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2017-12166"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-04-06 22:04
Modified
2025-04-03 01:03
Severity ?
Summary
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
References
cve@mitre.orghttp://openvpn.net/changelog.htmlPatch
cve@mitre.orghttp://secunia.com/advisories/19531Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19598
cve@mitre.orghttp://secunia.com/advisories/19837
cve@mitre.orghttp://secunia.com/advisories/19897
cve@mitre.orghttp://sourceforge.net/mailarchive/forum.php?thread_id=10093825&forum_id=8482
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1045
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:069
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_04_28.html
cve@mitre.orghttp://www.osreviews.net/reviews/security/openvpn-print
cve@mitre.orghttp://www.osvdb.org/24444
cve@mitre.orghttp://www.securityfocus.com/bid/17392Patch
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1261
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/25667
af854a3a-2127-422b-91ae-364da2661108http://openvpn.net/changelog.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19531Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19598
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19837
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19897
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/mailarchive/forum.php?thread_id=10093825&forum_id=8482
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1045
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:069
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_04_28.html
af854a3a-2127-422b-91ae-364da2661108http://www.osreviews.net/reviews/security/openvpn-print
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/24444
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/17392Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1261
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/25667



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6457C946-123B-4B85-9253-D284A7A16A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DF6B1F4-6313-4BF4-AD87-431A1C9D40C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B42CB75B-355B-4D80-91EA-77723B275D0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E5EFEC7-D9B6-454A-A36A-C75874564FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "21846206-4CF3-426F-9BE7-93471987BC06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED93D78-3BA8-43DB-B5AF-D2D3941C9DAD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable."
    }
  ],
  "evaluatorSolution": "OpenVPN version 2.0.6 fixes this vulnerability.",
  "id": "CVE-2006-1629",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-04-06T22:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://openvpn.net/changelog.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19531"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19598"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19837"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19897"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sourceforge.net/mailarchive/forum.php?thread_id=10093825\u0026forum_id=8482"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1045"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:069"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2006_04_28.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osreviews.net/reviews/security/openvpn-print"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/24444"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/17392"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1261"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25667"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://openvpn.net/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19531"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19598"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19837"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19897"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/mailarchive/forum.php?thread_id=10093825\u0026forum_id=8482"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1045"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:069"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_04_28.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osreviews.net/reviews/security/openvpn-print"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/24444"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/17392"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1261"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25667"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-06-27 13:29
Modified
2025-04-20 01:37
Summary
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension().
Impacted products
Vendor Product Version
openvpn openvpn *
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.1
openvpn openvpn 2.4.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "216840B9-FCDB-4921-BE12-2A1FA42F8FDE",
              "versionEndIncluding": "2.3.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F5C67A-34A4-4C7E-BCA9-AF3E5FC70AF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "A857CA88-60B0-4D34-87B6-770B67981501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B42297EE-B347-4BD8-A657-BDF0AA010C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "7C7A56E8-09C8-4DB2-9244-9E5E2BEC1821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "41ACD637-EF6B-40E4-BDE6-0EE7D6AEBAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1A4150AD-3F46-487D-BCF8-79D0AE2A092D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F7663E-3EB5-44F4-B7DE-294A549A12BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "81434C3E-F992-4F29-9092-6823989B6909",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension()."
    },
    {
      "lang": "es",
      "value": "Las versiones de OpenVPN anteriores a 2.4.3 y 2.3.17, son vulnerables a una denegaci\u00f3n de servicio remota debido a un agotamiento de memoria causado por p\u00e9rdida de memoria y un problema de doble liberaci\u00f3n (Double Free) en la funci\u00f3n extract_x509_extension()."
    }
  ],
  "id": "CVE-2017-7521",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-06-27T13:29:00.240",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2017/dsa-3900"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/99230"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1038768"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2017/dsa-3900"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/99230"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1038768"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-415"
        },
        {
          "lang": "en",
          "value": "CWE-772"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-08-24 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate.
Impacted products
Vendor Product Version
openvpn openvpn 2.0
openvpn openvpn 2.0.1_rc1
openvpn openvpn 2.0.1_rc2
openvpn openvpn 2.0.1_rc3
openvpn openvpn 2.0.1_rc4
openvpn openvpn 2.0.1_rc5
openvpn openvpn 2.0.1_rc6
openvpn openvpn 2.0.1_rc7
openvpn openvpn 2.0_beta1
openvpn openvpn 2.0_beta2
openvpn openvpn 2.0_beta3
openvpn openvpn 2.0_beta4
openvpn openvpn 2.0_beta5
openvpn openvpn 2.0_beta6
openvpn openvpn 2.0_beta7
openvpn openvpn 2.0_beta8
openvpn openvpn 2.0_beta9
openvpn openvpn 2.0_beta10
openvpn openvpn 2.0_beta11
openvpn openvpn 2.0_beta12
openvpn openvpn 2.0_beta13
openvpn openvpn 2.0_beta15
openvpn openvpn 2.0_beta16
openvpn openvpn 2.0_beta17
openvpn openvpn 2.0_beta18
openvpn openvpn 2.0_beta19
openvpn openvpn 2.0_beta20
openvpn openvpn 2.0_beta28
openvpn openvpn 2.0_rc1
openvpn openvpn 2.0_rc2
openvpn openvpn 2.0_rc3
openvpn openvpn 2.0_rc4
openvpn openvpn 2.0_rc5
openvpn openvpn 2.0_rc6
openvpn openvpn 2.0_rc7
openvpn openvpn 2.0_rc8
openvpn openvpn 2.0_rc9
openvpn openvpn 2.0_rc10
openvpn openvpn 2.0_rc11
openvpn openvpn 2.0_rc12
openvpn openvpn 2.0_rc13
openvpn openvpn 2.0_rc14
openvpn openvpn 2.0_rc15
openvpn openvpn 2.0_rc16
openvpn openvpn 2.0_rc17
openvpn openvpn 2.0_rc18
openvpn openvpn 2.0_rc19
openvpn openvpn 2.0_rc20
openvpn openvpn 2.0_rc21
openvpn openvpn 2.0_test1
openvpn openvpn 2.0_test2
openvpn openvpn 2.0_test3
openvpn openvpn 2.0_test5
openvpn openvpn 2.0_test6
openvpn openvpn 2.0_test7
openvpn openvpn 2.0_test8
openvpn openvpn 2.0_test9
openvpn openvpn 2.0_test10
openvpn openvpn 2.0_test11
openvpn openvpn 2.0_test12
openvpn openvpn 2.0_test14
openvpn openvpn 2.0_test15
openvpn openvpn 2.0_test16
openvpn openvpn 2.0_test17
openvpn openvpn 2.0_test18
openvpn openvpn 2.0_test19
openvpn openvpn 2.0_test20
openvpn openvpn 2.0_test21
openvpn openvpn 2.0_test22
openvpn openvpn 2.0_test23
openvpn openvpn 2.0_test24
openvpn openvpn 2.0_test26
openvpn openvpn 2.0_test27
openvpn openvpn 2.0_test29



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6457C946-123B-4B85-9253-D284A7A16A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0ECEAF-401A-434E-9B0A-1A234BAEFC4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E751FA0E-0DF4-4F81-912A-1A132640246D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F61AC6-EDF6-4818-BA51-3EAA299680B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32984D8-9631-407B-834E-303B9405A425",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB44A872-3FE2-47E9-BA84-B6E1015E1973",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F020080D-7181-400D-988E-6844D1653464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D08038-9815-4222-9CD3-1211FE5954A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BDEBEDA-437A-4942-8A71-7B25DD558BCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EB8A78E-DAB9-4A72-BC54-58230E1E9B9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5D74ED1-34C5-4F95-A941-83664AFFF2ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0747C1A9-C404-4FBD-AA8F-9DBB70FEB4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3B1AD4-9EA0-4D86-90E1-3366FBC5629D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E483BD0-CAB9-4DA0-AAA4-A934B8318FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F04FAB1-A558-4F93-9FBF-043DE259A813",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A189A733-3130-41B4-94DD-E99E294D0FBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DEE5695-DC49-445D-864A-4739E16DF762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FBF146F-2CFA-4F14-BFBC-E01B58F9F72B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D263CA-8B2C-4B66-8990-6224BAF52A8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta12:*:*:*:*:*:*:*",
              "matchCriteriaId": "825C9FCE-AD76-4E32-8FEC-EEFA0662BC04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7519FA-831A-41D7-AFC3-B9457E6DFB4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta15:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB79AFD-493F-41F1-9EC1-8BCC0D28A914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C8F091B-194A-4FC5-87F4-A76CB490F3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11716B49-A920-4A1B-BEA5-4105213B9731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta18:*:*:*:*:*:*:*",
              "matchCriteriaId": "756A7AF5-E502-4EDC-9693-4041C993E3BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta19:*:*:*:*:*:*:*",
              "matchCriteriaId": "9885BC3E-1854-4561-9906-FFAEECA5B6FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7B7759F-F228-436D-BC86-7317B0109C02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta28:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB9BD19-1BF9-42D0-9E43-7D95EE010347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0A6E23-6456-4305-A7DA-8CA1D506D4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D985B9F0-5B4F-4120-8ECF-506C5F6179FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF7E6096-58BF-47F1-982B-27A9ED735AEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "62362541-FE20-47ED-9E03-94216A3D43CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BD7019-BBA5-4D08-85C8-571D2EC03FA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1D56A4-A03C-445C-993B-1AA12024D4FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F563B1FD-FC1F-4304-8141-A1188A190835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4269ED1A-3031-4572-B134-62C6E533D176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc9:*:*:*:*:*:*:*",
              "matchCriteriaId": "140999A7-E9BB-4459-B3F8-48DF8F5DFE0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41CD75B0-24D0-40BA-A4FB-925BD5414298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc11:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED8F3C5-8E43-4B07-8224-38BF4774F4CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC88614-E782-447B-B854-955498FAAA13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C1B8EE-3C12-452F-986E-6FD8A230685A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc14:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AC6851-F63E-47D7-BDEF-3BFF39E94D9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc15:*:*:*:*:*:*:*",
              "matchCriteriaId": "685F5555-793D-4FAA-8CF4-578490CFAC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E688CF0C-134B-49E2-AEB3-45ECACB8B5FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D385327-D1FF-4A22-A0C0-0C5AA53590C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc18:*:*:*:*:*:*:*",
              "matchCriteriaId": "51329755-1DBF-40E1-960C-E924CDC4B22C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc19:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE65AC5-C218-456F-86FB-1C8BEC3C4598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1412133F-3B44-43B6-A4FF-FF80E7B564E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B55EE355-28A1-4955-9ADD-A8E02376C9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E942C13E-6B54-465F-8026-ED49BD7EA2F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AADF30CF-AD36-45EB-AF50-EB0533B20B70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD078F82-361C-4B38-86E8-85E129F41A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9831C92-7717-4650-8689-3C41B773C5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3521E7-572E-4ADD-AAF6-F1AE505B4BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73290B2-384B-4B0F-8763-EF4D5D7C39FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4728B3CD-5B54-4B0B-8967-DE7D9E1474F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F353B495-D69A-4831-9E5B-F15F8F749C84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16647409-3ADD-4E86-A053-4A7B8365700E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5CA9F6-68FE-4412-8CD5-F85E970249F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test12:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A74354-1EAB-4A4F-A79C-C04E9BCDF594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test14:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A016A3-CAA9-4FCB-B909-F4163CE1E19E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test15:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A53B7C-8E9D-4DD6-8B00-628F7796A365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D5AADA5-05DA-4660-9636-A3B737916A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test17:*:*:*:*:*:*:*",
              "matchCriteriaId": "2778FEDE-063B-4454-9FA7-F526334CF9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test18:*:*:*:*:*:*:*",
              "matchCriteriaId": "989D471D-3F81-4018-A124-7FBEB3F4AB87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test19:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4EA97AE-B2DD-40F8-81E1-467E895CE736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C82A6A-4548-4508-B337-1061E57D78AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test21:*:*:*:*:*:*:*",
              "matchCriteriaId": "36A972BC-6956-4195-933C-F3694BFEFB50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EF5187-C008-4927-B5CB-A491768E9822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test23:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A39ECE-7C8D-4BB8-A408-08EA0879F03F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test24:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C67474C-3274-4F62-AF98-6953F9744522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test26:*:*:*:*:*:*:*",
              "matchCriteriaId": "D799CAF5-BFC3-4A80-8AE2-D292B7F9D9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test27:*:*:*:*:*:*:*",
              "matchCriteriaId": "98D3B905-FCD7-4136-A94C-76A95994CD85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE172A1-D9A5-4FF7-B316-4E0BD639B35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate."
    }
  ],
  "id": "CVE-2005-2534",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-24T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://openvpn.net/changelog.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/16463"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17103"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-851"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14610"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openvpn.net/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/16463"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17103"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14610"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-07-12 11:15
Modified
2024-11-21 06:21
Summary
OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration.
Impacted products
Vendor Product Version
openvpn openvpn 3.6
openvpn openvpn 3.6.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2003E88A-EC3B-48F8-9E89-78CF2BBFFA4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE05E9D-DFA1-4EEC-9530-3C5EBFA68F7C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration."
    },
    {
      "lang": "es",
      "value": "OpenVPN 3 Core Library versiones 3.6 y 3.6.1, permiten a un atacante tipo \"man-in-the-middle\" omitir la autenticaci\u00f3n de certificados al emitir un certificado de servidor no relacionado usando el mismo nombre de host encontrado en la opci\u00f3n verify-x509-name en la configuraci\u00f3n de un cliente"
    }
  ],
  "id": "CVE-2021-3547",
  "lastModified": "2024-11-21T06:21:48.747",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-07-12T11:15:08.233",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2021-3547"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2021-3547"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-305"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-08-24 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted.
Impacted products
Vendor Product Version
openvpn openvpn 2.0
openvpn openvpn 2.0.1_rc1
openvpn openvpn 2.0.1_rc2
openvpn openvpn 2.0.1_rc3
openvpn openvpn 2.0.1_rc4
openvpn openvpn 2.0.1_rc5
openvpn openvpn 2.0.1_rc6
openvpn openvpn 2.0.1_rc7
openvpn openvpn 2.0_beta1
openvpn openvpn 2.0_beta2
openvpn openvpn 2.0_beta3
openvpn openvpn 2.0_beta4
openvpn openvpn 2.0_beta5
openvpn openvpn 2.0_beta6
openvpn openvpn 2.0_beta7
openvpn openvpn 2.0_beta8
openvpn openvpn 2.0_beta9
openvpn openvpn 2.0_beta10
openvpn openvpn 2.0_beta11
openvpn openvpn 2.0_beta12
openvpn openvpn 2.0_beta13
openvpn openvpn 2.0_beta15
openvpn openvpn 2.0_beta16
openvpn openvpn 2.0_beta17
openvpn openvpn 2.0_beta18
openvpn openvpn 2.0_beta19
openvpn openvpn 2.0_beta20
openvpn openvpn 2.0_beta28
openvpn openvpn 2.0_rc1
openvpn openvpn 2.0_rc2
openvpn openvpn 2.0_rc3
openvpn openvpn 2.0_rc4
openvpn openvpn 2.0_rc5
openvpn openvpn 2.0_rc6
openvpn openvpn 2.0_rc7
openvpn openvpn 2.0_rc8
openvpn openvpn 2.0_rc9
openvpn openvpn 2.0_rc10
openvpn openvpn 2.0_rc11
openvpn openvpn 2.0_rc12
openvpn openvpn 2.0_rc13
openvpn openvpn 2.0_rc14
openvpn openvpn 2.0_rc15
openvpn openvpn 2.0_rc16
openvpn openvpn 2.0_rc17
openvpn openvpn 2.0_rc18
openvpn openvpn 2.0_rc19
openvpn openvpn 2.0_rc20
openvpn openvpn 2.0_rc21
openvpn openvpn 2.0_test1
openvpn openvpn 2.0_test2
openvpn openvpn 2.0_test3
openvpn openvpn 2.0_test5
openvpn openvpn 2.0_test6
openvpn openvpn 2.0_test7
openvpn openvpn 2.0_test8
openvpn openvpn 2.0_test9
openvpn openvpn 2.0_test10
openvpn openvpn 2.0_test11
openvpn openvpn 2.0_test12
openvpn openvpn 2.0_test14
openvpn openvpn 2.0_test15
openvpn openvpn 2.0_test16
openvpn openvpn 2.0_test17
openvpn openvpn 2.0_test18
openvpn openvpn 2.0_test19
openvpn openvpn 2.0_test20
openvpn openvpn 2.0_test21
openvpn openvpn 2.0_test22
openvpn openvpn 2.0_test23
openvpn openvpn 2.0_test24
openvpn openvpn 2.0_test26
openvpn openvpn 2.0_test27
openvpn openvpn 2.0_test29



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6457C946-123B-4B85-9253-D284A7A16A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0ECEAF-401A-434E-9B0A-1A234BAEFC4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E751FA0E-0DF4-4F81-912A-1A132640246D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F61AC6-EDF6-4818-BA51-3EAA299680B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32984D8-9631-407B-834E-303B9405A425",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB44A872-3FE2-47E9-BA84-B6E1015E1973",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F020080D-7181-400D-988E-6844D1653464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D08038-9815-4222-9CD3-1211FE5954A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BDEBEDA-437A-4942-8A71-7B25DD558BCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EB8A78E-DAB9-4A72-BC54-58230E1E9B9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5D74ED1-34C5-4F95-A941-83664AFFF2ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0747C1A9-C404-4FBD-AA8F-9DBB70FEB4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3B1AD4-9EA0-4D86-90E1-3366FBC5629D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E483BD0-CAB9-4DA0-AAA4-A934B8318FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F04FAB1-A558-4F93-9FBF-043DE259A813",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A189A733-3130-41B4-94DD-E99E294D0FBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DEE5695-DC49-445D-864A-4739E16DF762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FBF146F-2CFA-4F14-BFBC-E01B58F9F72B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D263CA-8B2C-4B66-8990-6224BAF52A8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta12:*:*:*:*:*:*:*",
              "matchCriteriaId": "825C9FCE-AD76-4E32-8FEC-EEFA0662BC04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7519FA-831A-41D7-AFC3-B9457E6DFB4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta15:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB79AFD-493F-41F1-9EC1-8BCC0D28A914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C8F091B-194A-4FC5-87F4-A76CB490F3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11716B49-A920-4A1B-BEA5-4105213B9731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta18:*:*:*:*:*:*:*",
              "matchCriteriaId": "756A7AF5-E502-4EDC-9693-4041C993E3BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta19:*:*:*:*:*:*:*",
              "matchCriteriaId": "9885BC3E-1854-4561-9906-FFAEECA5B6FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7B7759F-F228-436D-BC86-7317B0109C02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta28:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB9BD19-1BF9-42D0-9E43-7D95EE010347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0A6E23-6456-4305-A7DA-8CA1D506D4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D985B9F0-5B4F-4120-8ECF-506C5F6179FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF7E6096-58BF-47F1-982B-27A9ED735AEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "62362541-FE20-47ED-9E03-94216A3D43CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BD7019-BBA5-4D08-85C8-571D2EC03FA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1D56A4-A03C-445C-993B-1AA12024D4FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F563B1FD-FC1F-4304-8141-A1188A190835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4269ED1A-3031-4572-B134-62C6E533D176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc9:*:*:*:*:*:*:*",
              "matchCriteriaId": "140999A7-E9BB-4459-B3F8-48DF8F5DFE0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41CD75B0-24D0-40BA-A4FB-925BD5414298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc11:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED8F3C5-8E43-4B07-8224-38BF4774F4CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC88614-E782-447B-B854-955498FAAA13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C1B8EE-3C12-452F-986E-6FD8A230685A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc14:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AC6851-F63E-47D7-BDEF-3BFF39E94D9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc15:*:*:*:*:*:*:*",
              "matchCriteriaId": "685F5555-793D-4FAA-8CF4-578490CFAC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E688CF0C-134B-49E2-AEB3-45ECACB8B5FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D385327-D1FF-4A22-A0C0-0C5AA53590C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc18:*:*:*:*:*:*:*",
              "matchCriteriaId": "51329755-1DBF-40E1-960C-E924CDC4B22C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc19:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE65AC5-C218-456F-86FB-1C8BEC3C4598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1412133F-3B44-43B6-A4FF-FF80E7B564E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B55EE355-28A1-4955-9ADD-A8E02376C9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E942C13E-6B54-465F-8026-ED49BD7EA2F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AADF30CF-AD36-45EB-AF50-EB0533B20B70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD078F82-361C-4B38-86E8-85E129F41A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9831C92-7717-4650-8689-3C41B773C5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3521E7-572E-4ADD-AAF6-F1AE505B4BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73290B2-384B-4B0F-8763-EF4D5D7C39FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4728B3CD-5B54-4B0B-8967-DE7D9E1474F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F353B495-D69A-4831-9E5B-F15F8F749C84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16647409-3ADD-4E86-A053-4A7B8365700E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5CA9F6-68FE-4412-8CD5-F85E970249F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test12:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A74354-1EAB-4A4F-A79C-C04E9BCDF594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test14:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A016A3-CAA9-4FCB-B909-F4163CE1E19E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test15:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A53B7C-8E9D-4DD6-8B00-628F7796A365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D5AADA5-05DA-4660-9636-A3B737916A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test17:*:*:*:*:*:*:*",
              "matchCriteriaId": "2778FEDE-063B-4454-9FA7-F526334CF9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test18:*:*:*:*:*:*:*",
              "matchCriteriaId": "989D471D-3F81-4018-A124-7FBEB3F4AB87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test19:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4EA97AE-B2DD-40F8-81E1-467E895CE736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C82A6A-4548-4508-B337-1061E57D78AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test21:*:*:*:*:*:*:*",
              "matchCriteriaId": "36A972BC-6956-4195-933C-F3694BFEFB50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EF5187-C008-4927-B5CB-A491768E9822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test23:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A39ECE-7C8D-4BB8-A408-08EA0879F03F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test24:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C67474C-3274-4F62-AF98-6953F9744522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test26:*:*:*:*:*:*:*",
              "matchCriteriaId": "D799CAF5-BFC3-4A80-8AE2-D292B7F9D9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test27:*:*:*:*:*:*:*",
              "matchCriteriaId": "98D3B905-FCD7-4136-A94C-76A95994CD85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE172A1-D9A5-4FF7-B316-4E0BD639B35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted."
    }
  ],
  "id": "CVE-2005-2532",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-24T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://openvpn.net/changelog.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/16463"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17103"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-851"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14607"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openvpn.net/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/16463"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17103"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14607"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-07-02 13:15
Modified
2024-11-21 06:21
Summary
OpenVPN before version 2.5.3 on Windows allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (openvpn.exe).
Impacted products
Vendor Product Version
openvpn openvpn *
microsoft windows -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F9800A3-9DDA-44B2-9090-6E56BAA2DD71",
              "versionEndExcluding": "2.5.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN before version 2.5.3 on Windows allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (openvpn.exe)."
    },
    {
      "lang": "es",
      "value": "OpenVPN versiones anteriores a 2.5.3 en Windows permite a usuarios locales cargar bibliotecas arbitrarias de carga din\u00e1mica por medio de un archivo de configuraci\u00f3n de OpenSSL si est\u00e1 presente, permitiendo a un usuario ejecutar c\u00f3digo arbitrario con el mismo nivel de privilegio que el proceso principal de OpenVPN (openvpn.exe)"
    }
  ],
  "id": "CVE-2021-3606",
  "lastModified": "2024-11-21T06:21:57.783",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-07-02T13:15:07.983",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2021-3606"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2021-3606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-04-26 14:15
Modified
2024-11-21 05:04
Summary
OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.
References
security@openvpn.nethttps://community.openvpn.net/openvpn/wiki/CVE-2020-15078Patch, Vendor Advisory
security@openvpn.nethttps://community.openvpn.net/openvpn/wiki/SecurityAnnouncementsBroken Link
security@openvpn.nethttps://lists.debian.org/debian-lts-announce/2022/05/msg00002.htmlMailing List, Third Party Advisory
security@openvpn.nethttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GJUXEYHUPREEBPX23VPEKMFXUPVO3PMU/
security@openvpn.nethttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGEGLC4YGBDN5CGHTNWN2GH6DJJA36T2/
security@openvpn.nethttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLDB3OBQ3AODYYRN7NRCABV6I4AUFAT6/
security@openvpn.nethttps://security.gentoo.org/glsa/202105-25Third Party Advisory
security@openvpn.nethttps://usn.ubuntu.com/usn/usn-4933-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://community.openvpn.net/openvpn/wiki/CVE-2020-15078Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://community.openvpn.net/openvpn/wiki/SecurityAnnouncementsBroken Link
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2022/05/msg00002.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GJUXEYHUPREEBPX23VPEKMFXUPVO3PMU/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGEGLC4YGBDN5CGHTNWN2GH6DJJA36T2/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLDB3OBQ3AODYYRN7NRCABV6I4AUFAT6/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202105-25Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/usn/usn-4933-1Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F53F5F-60D6-4F46-AF6A-A30045312564",
              "versionEndExcluding": "2.4.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C756C27-A377-4263-9A59-EB36DFDD5CFE",
              "versionEndExcluding": "2.5.2",
              "versionStartIncluding": "2.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "338B3AAC-C147-4A31-95E7-6E8A6FB4B3FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EF1C1CC-3FAE-4DE3-BC41-E5B14D5721F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks."
    },
    {
      "lang": "es",
      "value": "OpenVPN versiones 2.5.1 y anteriores, permiten a atacantes remotos omitir la autenticaci\u00f3n y los datos del canal de control de acceso en servidores configurados con autenticaci\u00f3n diferida, que pueden ser usados para desencadenar potencialmente m\u00e1s fugas de informaci\u00f3n"
    }
  ],
  "id": "CVE-2020-15078",
  "lastModified": "2024-11-21T05:04:45.900",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-04-26T14:15:08.623",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2020-15078"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Broken Link"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
    },
    {
      "source": "security@openvpn.net",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GJUXEYHUPREEBPX23VPEKMFXUPVO3PMU/"
    },
    {
      "source": "security@openvpn.net",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGEGLC4YGBDN5CGHTNWN2GH6DJJA36T2/"
    },
    {
      "source": "security@openvpn.net",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLDB3OBQ3AODYYRN7NRCABV6I4AUFAT6/"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202105-25"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/usn/usn-4933-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2020-15078"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GJUXEYHUPREEBPX23VPEKMFXUPVO3PMU/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGEGLC4YGBDN5CGHTNWN2GH6DJJA36T2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLDB3OBQ3AODYYRN7NRCABV6I4AUFAT6/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202105-25"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/usn/usn-4933-1"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-305"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-306"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-07-08 11:15
Modified
2024-11-21 09:04
Summary
The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.
Impacted products
Vendor Product Version
openvpn openvpn *
openvpn openvpn *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "62343D14-4C89-4E6F-9C74-46E7EEAF79CB",
              "versionEndExcluding": "2.5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "0E77CFBC-2014-4588-B77C-C34E333645A7",
              "versionEndExcluding": "2.6.10",
              "versionStartIncluding": "2.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges."
    },
    {
      "lang": "es",
      "value": "El servicio interactivo en OpenVPN 2.6.9 y versiones anteriores permite a un atacante enviar datos provocando un desbordamiento de pila que puede usarse para ejecutar c\u00f3digo arbitrario con m\u00e1s privilegios."
    }
  ],
  "id": "CVE-2024-27459",
  "lastModified": "2024-11-21T09:04:39.057",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-07-08T11:15:10.303",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-27459"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Mailing List"
      ],
      "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-27459"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-121"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-11-18 02:55
Modified
2025-04-11 00:51
Severity ?
Summary
The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2013-May/105568.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2013-May/105609.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-11/msg00012.htmlVendor Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-11/msg00016.html
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:167
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2013/05/06/6
secalert@redhat.comhttps://bugs.gentoo.org/show_bug.cgi?id=468756
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=960192
secalert@redhat.comhttps://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc
secalert@redhat.comhttps://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2eeExploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105568.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105609.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-11/msg00012.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-11/msg00016.html
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:167
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2013/05/06/6
af854a3a-2127-422b-91ae-364da2661108https://bugs.gentoo.org/show_bug.cgi?id=468756
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=960192
af854a3a-2127-422b-91ae-364da2661108https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc
af854a3a-2127-422b-91ae-364da2661108https://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2eeExploit, Patch
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC35891F-BC4F-4DBB-8879-4952685D419E",
              "versionEndIncluding": "2.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "912E57A3-A4D0-4736-858F-51A500E886B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "13960B6E-F1E8-49E5-88A0-ECCC938AC4DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "862743EA-7B6E-4478-AD90-1F930E97BB2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "79114721-FA19-43FF-8030-74652FCF937B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3AF5D2-21CC-4243-A2A4-99273B7AD9D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B693F0CA-7A3A-42CA-A6BE-62D840CE336C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "345C3123-7E73-4094-8764-8BF881B6ABE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F00F2FF1-9CC2-446B-9468-1FB7D40371E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB625AC3-B428-44BB-99F4-F0FE00DA1C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25DDCBB-798B-43BF-88FF-2EDB57BEA01F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F6FE9B-62E0-47E3-A977-DA51249A353B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "88C2922E-6E95-45BF-ABF1-B1D799769DB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D915A07-3B93-4D7C-8D52-73B696392B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "486CD3E2-1B1A-4A1D-98ED-0E2EEAB0A0CF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n openvpn_decrypt en el archivo crypto.c en OpenVPN versiones 2.3.0 y anteriores, cuando se ejecuta en modo UDP, permite a los atacantes remotos obtener informaci\u00f3n confidencial por medio de un ataque de sincronizaci\u00f3n que implica una funci\u00f3n de comparaci\u00f3n HMAC que no se ejecuta en tiempo constante y un ataque de tipo padding oracle en el cifrado en modo CBC."
    }
  ],
  "id": "CVE-2013-2061",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-11-18T02:55:07.530",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105568.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105609.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00012.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00016.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:167"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2013/05/06/6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugs.gentoo.org/show_bug.cgi?id=468756"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960192"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2ee"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105568.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105609.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/05/06/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugs.gentoo.org/show_bug.cgi?id=468756"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960192"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2ee"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-04-02 21:15
Modified
2025-05-24 01:38
Summary
OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase
Impacted products
Vendor Product Version
openvpn openvpn *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "2BC16851-89DA-4AFB-96D2-AAF258DCF5DC",
              "versionEndIncluding": "2.6.13",
              "versionStartIncluding": "2.6.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase"
    },
    {
      "lang": "es",
      "value": "Las versiones 2.6.1 a 2.6.13 de OpenVPN en modo servidor que utilizan TLS-crypt-v2 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio al corromper y reproducir paquetes de red en la fase inicial del protocolo de enlace."
    }
  ],
  "id": "CVE-2025-2704",
  "lastModified": "2025-05-24T01:38:01.433",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-04-02T21:15:32.943",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Broken Link"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2025-2704"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2025/04/02/5"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-754"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-754"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-05-05 19:02
Modified
2025-04-03 01:03
Severity ?
Summary
OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service.
Impacted products
Vendor Product Version
openvpn openvpn 2.0
openvpn openvpn 2.0.1_rc1
openvpn openvpn 2.0.1_rc2
openvpn openvpn 2.0.1_rc3
openvpn openvpn 2.0.1_rc4
openvpn openvpn 2.0.1_rc5
openvpn openvpn 2.0.1_rc6
openvpn openvpn 2.0.1_rc7
openvpn openvpn 2.0.2_rc1
openvpn openvpn 2.0.3_rc1
openvpn openvpn 2.0.4
openvpn openvpn 2.0.6_rc1
openvpn openvpn 2.0_beta1
openvpn openvpn 2.0_beta2
openvpn openvpn 2.0_beta3
openvpn openvpn 2.0_beta4
openvpn openvpn 2.0_beta5
openvpn openvpn 2.0_beta6
openvpn openvpn 2.0_beta7
openvpn openvpn 2.0_beta8
openvpn openvpn 2.0_beta9
openvpn openvpn 2.0_beta10
openvpn openvpn 2.0_beta11
openvpn openvpn 2.0_beta12
openvpn openvpn 2.0_beta13
openvpn openvpn 2.0_beta15
openvpn openvpn 2.0_beta16
openvpn openvpn 2.0_beta17
openvpn openvpn 2.0_beta18
openvpn openvpn 2.0_beta19
openvpn openvpn 2.0_beta20
openvpn openvpn 2.0_beta28
openvpn openvpn 2.0_rc1
openvpn openvpn 2.0_rc2
openvpn openvpn 2.0_rc3
openvpn openvpn 2.0_rc4
openvpn openvpn 2.0_rc5
openvpn openvpn 2.0_rc6
openvpn openvpn 2.0_rc7
openvpn openvpn 2.0_rc8
openvpn openvpn 2.0_rc9
openvpn openvpn 2.0_rc10
openvpn openvpn 2.0_rc11
openvpn openvpn 2.0_rc12
openvpn openvpn 2.0_rc13
openvpn openvpn 2.0_rc14
openvpn openvpn 2.0_rc15
openvpn openvpn 2.0_rc16
openvpn openvpn 2.0_rc17
openvpn openvpn 2.0_rc18
openvpn openvpn 2.0_rc19
openvpn openvpn 2.0_rc20
openvpn openvpn 2.0_rc21
openvpn openvpn 2.0_test1
openvpn openvpn 2.0_test2
openvpn openvpn 2.0_test3
openvpn openvpn 2.0_test4
openvpn openvpn 2.0_test5
openvpn openvpn 2.0_test6
openvpn openvpn 2.0_test7
openvpn openvpn 2.0_test8
openvpn openvpn 2.0_test9
openvpn openvpn 2.0_test10
openvpn openvpn 2.0_test11
openvpn openvpn 2.0_test12
openvpn openvpn 2.0_test14
openvpn openvpn 2.0_test15
openvpn openvpn 2.0_test16
openvpn openvpn 2.0_test17
openvpn openvpn 2.0_test18
openvpn openvpn 2.0_test19
openvpn openvpn 2.0_test20
openvpn openvpn 2.0_test21
openvpn openvpn 2.0_test22
openvpn openvpn 2.0_test23
openvpn openvpn 2.0_test24
openvpn openvpn 2.0_test25
openvpn openvpn 2.0_test26
openvpn openvpn 2.0_test27
openvpn openvpn 2.0_test29
openvpn openvpn_access_server 2.0.1
openvpn openvpn_access_server 2.0.2
openvpn openvpn_access_server 2.0.5
openvpn openvpn_access_server 2.0.6
openvpn openvpn_access_server 2.0.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6457C946-123B-4B85-9253-D284A7A16A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0ECEAF-401A-434E-9B0A-1A234BAEFC4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E751FA0E-0DF4-4F81-912A-1A132640246D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F61AC6-EDF6-4818-BA51-3EAA299680B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32984D8-9631-407B-834E-303B9405A425",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB44A872-3FE2-47E9-BA84-B6E1015E1973",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F020080D-7181-400D-988E-6844D1653464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D08038-9815-4222-9CD3-1211FE5954A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.2_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE43EA96-5B3C-498F-A040-C800821DA49B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.3_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "236F2BBF-0CF5-465E-9E65-8AD6D17F57A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DF6B1F4-6313-4BF4-AD87-431A1C9D40C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.6_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA031086-95E4-4447-A06B-3B2926E3265F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BDEBEDA-437A-4942-8A71-7B25DD558BCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EB8A78E-DAB9-4A72-BC54-58230E1E9B9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5D74ED1-34C5-4F95-A941-83664AFFF2ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0747C1A9-C404-4FBD-AA8F-9DBB70FEB4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3B1AD4-9EA0-4D86-90E1-3366FBC5629D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E483BD0-CAB9-4DA0-AAA4-A934B8318FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F04FAB1-A558-4F93-9FBF-043DE259A813",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A189A733-3130-41B4-94DD-E99E294D0FBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DEE5695-DC49-445D-864A-4739E16DF762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FBF146F-2CFA-4F14-BFBC-E01B58F9F72B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D263CA-8B2C-4B66-8990-6224BAF52A8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta12:*:*:*:*:*:*:*",
              "matchCriteriaId": "825C9FCE-AD76-4E32-8FEC-EEFA0662BC04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7519FA-831A-41D7-AFC3-B9457E6DFB4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta15:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB79AFD-493F-41F1-9EC1-8BCC0D28A914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C8F091B-194A-4FC5-87F4-A76CB490F3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11716B49-A920-4A1B-BEA5-4105213B9731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta18:*:*:*:*:*:*:*",
              "matchCriteriaId": "756A7AF5-E502-4EDC-9693-4041C993E3BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta19:*:*:*:*:*:*:*",
              "matchCriteriaId": "9885BC3E-1854-4561-9906-FFAEECA5B6FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7B7759F-F228-436D-BC86-7317B0109C02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta28:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB9BD19-1BF9-42D0-9E43-7D95EE010347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0A6E23-6456-4305-A7DA-8CA1D506D4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D985B9F0-5B4F-4120-8ECF-506C5F6179FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF7E6096-58BF-47F1-982B-27A9ED735AEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "62362541-FE20-47ED-9E03-94216A3D43CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BD7019-BBA5-4D08-85C8-571D2EC03FA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1D56A4-A03C-445C-993B-1AA12024D4FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F563B1FD-FC1F-4304-8141-A1188A190835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4269ED1A-3031-4572-B134-62C6E533D176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc9:*:*:*:*:*:*:*",
              "matchCriteriaId": "140999A7-E9BB-4459-B3F8-48DF8F5DFE0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41CD75B0-24D0-40BA-A4FB-925BD5414298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc11:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED8F3C5-8E43-4B07-8224-38BF4774F4CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC88614-E782-447B-B854-955498FAAA13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C1B8EE-3C12-452F-986E-6FD8A230685A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc14:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AC6851-F63E-47D7-BDEF-3BFF39E94D9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc15:*:*:*:*:*:*:*",
              "matchCriteriaId": "685F5555-793D-4FAA-8CF4-578490CFAC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E688CF0C-134B-49E2-AEB3-45ECACB8B5FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D385327-D1FF-4A22-A0C0-0C5AA53590C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc18:*:*:*:*:*:*:*",
              "matchCriteriaId": "51329755-1DBF-40E1-960C-E924CDC4B22C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc19:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE65AC5-C218-456F-86FB-1C8BEC3C4598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1412133F-3B44-43B6-A4FF-FF80E7B564E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B55EE355-28A1-4955-9ADD-A8E02376C9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E942C13E-6B54-465F-8026-ED49BD7EA2F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AADF30CF-AD36-45EB-AF50-EB0533B20B70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD078F82-361C-4B38-86E8-85E129F41A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test4:*:*:*:*:*:*:*",
              "matchCriteriaId": "09ADBC1B-7835-4D63-AA86-EF056E008F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9831C92-7717-4650-8689-3C41B773C5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3521E7-572E-4ADD-AAF6-F1AE505B4BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73290B2-384B-4B0F-8763-EF4D5D7C39FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4728B3CD-5B54-4B0B-8967-DE7D9E1474F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F353B495-D69A-4831-9E5B-F15F8F749C84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16647409-3ADD-4E86-A053-4A7B8365700E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5CA9F6-68FE-4412-8CD5-F85E970249F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test12:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A74354-1EAB-4A4F-A79C-C04E9BCDF594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test14:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A016A3-CAA9-4FCB-B909-F4163CE1E19E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test15:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A53B7C-8E9D-4DD6-8B00-628F7796A365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D5AADA5-05DA-4660-9636-A3B737916A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test17:*:*:*:*:*:*:*",
              "matchCriteriaId": "2778FEDE-063B-4454-9FA7-F526334CF9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test18:*:*:*:*:*:*:*",
              "matchCriteriaId": "989D471D-3F81-4018-A124-7FBEB3F4AB87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test19:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4EA97AE-B2DD-40F8-81E1-467E895CE736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C82A6A-4548-4508-B337-1061E57D78AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test21:*:*:*:*:*:*:*",
              "matchCriteriaId": "36A972BC-6956-4195-933C-F3694BFEFB50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EF5187-C008-4927-B5CB-A491768E9822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test23:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A39ECE-7C8D-4BB8-A408-08EA0879F03F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test24:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C67474C-3274-4F62-AF98-6953F9744522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test25:*:*:*:*:*:*:*",
              "matchCriteriaId": "5196B669-CF0F-4FED-9EAF-72F335436BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test26:*:*:*:*:*:*:*",
              "matchCriteriaId": "D799CAF5-BFC3-4A80-8AE2-D292B7F9D9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test27:*:*:*:*:*:*:*",
              "matchCriteriaId": "98D3B905-FCD7-4136-A94C-76A95994CD85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE172A1-D9A5-4FF7-B316-4E0BD639B35D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B42CB75B-355B-4D80-91EA-77723B275D0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E5EFEC7-D9B6-454A-A36A-C75874564FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED93D78-3BA8-43DB-B5AF-D2D3941C9DAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2B16482-8058-46A8-9D56-DB73BFE32A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105F380-57BF-44BD-B31D-9D36DF9210A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service."
    }
  ],
  "id": "CVE-2006-2229",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-05-05T19:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://openvpn.net/man.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/25660"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/432863/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/432867/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/433000/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openvpn.net/man.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/25660"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/432863/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/432867/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/433000/100/0/threaded"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-11-01 12:47
Modified
2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=113081023121059&w=2
cve@mitre.orghttp://openvpn.net/changelog.html
cve@mitre.orghttp://secunia.com/advisories/17376Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17447
cve@mitre.orghttp://secunia.com/advisories/17452
cve@mitre.orghttp://secunia.com/advisories/17480
cve@mitre.orghttp://www.debian.org/security/2005/dsa-885
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200511-07.xml
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_25_sr.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/415487
cve@mitre.orghttp://www.securityfocus.com/bid/15239Patch
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2255
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=113081023121059&w=2
af854a3a-2127-422b-91ae-364da2661108http://openvpn.net/changelog.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17376Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17447
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17452
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17480
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-885
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_25_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/415487
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15239Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2255
Impacted products
Vendor Product Version
openvpn openvpn 2.0
openvpn openvpn 2.0_beta11
openvpn openvpn_access_server 2.0.1
openvpn openvpn_access_server 2.0.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6457C946-123B-4B85-9253-D284A7A16A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D263CA-8B2C-4B66-8990-6224BAF52A8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B42CB75B-355B-4D80-91EA-77723B275D0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E5EFEC7-D9B6-454A-A36A-C75874564FCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option."
    }
  ],
  "id": "CVE-2005-3393",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-11-01T12:47:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=113081023121059\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openvpn.net/changelog.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17376"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17447"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17452"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17480"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-885"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/415487"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/15239"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2255"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=113081023121059\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openvpn.net/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17376"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17447"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17452"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17480"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-885"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/415487"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/15239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2255"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-05-15 18:29
Modified
2025-04-20 01:37
Summary
OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.
Impacted products
Vendor Product Version
openvpn openvpn 2.3.12
openvpn openvpn 2.3.13
openvpn openvpn 2.3.14
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "288EE3C5-C915-4273-B1F1-D53BC028C990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A21C5FE2-2FF7-481F-B128-976EBA563208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF068FA2-03A0-4C7F-97B1-9CB5A49E9E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F5C67A-34A4-4C7E-BCA9-AF3E5FC70AF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "A857CA88-60B0-4D34-87B6-770B67981501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B42297EE-B347-4BD8-A657-BDF0AA010C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "7C7A56E8-09C8-4DB2-9244-9E5E2BEC1821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "41ACD637-EF6B-40E4-BDE6-0EE7D6AEBAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1A4150AD-3F46-487D-BCF8-79D0AE2A092D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F7663E-3EB5-44F4-B7DE-294A549A12BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2."
    },
    {
      "lang": "es",
      "value": "OpenVPN versi\u00f3n 2.3.12 y m\u00e1s recientes, son vulnerables a la Denegaci\u00f3n de Servicio no autenticada del servidor por medio de un paquete de control grande recibido. Tenga en cuenta que este problema se corrige en versiones 2.3.15 y 2.4.2."
    }
  ],
  "id": "CVE-2017-7478",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-05-15T18:29:00.293",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/98444"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1038473"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.exploit-db.com/exploits/41993/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/98444"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1038473"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/41993/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-08-04 19:41
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-14:*:*:*:*:*:*",
              "matchCriteriaId": "C6826F2C-9769-4F70-8121-988986C9DAFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-15:*:*:*:*:*:*",
              "matchCriteriaId": "38CDC26A-2EA1-4FD1-BE82-09ABE335A778",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:beta-16:*:*:*:*:*:*",
              "matchCriteriaId": "F4284CC6-B78D-478D-B815-3FB4D884A726",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_1:*:*:*:*:*:*",
              "matchCriteriaId": "F972B6E6-0553-454E-BF58-107E7A9EC9E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_2:*:*:*:*:*:*",
              "matchCriteriaId": "9DBF4843-5E4F-4C47-BBF8-4ADB45C422E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_3:*:*:*:*:*:*",
              "matchCriteriaId": "61BB61B4-2769-4F59-875F-9269C551E386",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_4:*:*:*:*:*:*",
              "matchCriteriaId": "DBD947CF-98BC-4C84-8149-B4EEFF1015AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_5:*:*:*:*:*:*",
              "matchCriteriaId": "FE621907-2D6B-4558-A9B9-E98AAF236D59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_6:*:*:*:*:*:*",
              "matchCriteriaId": "B57458F3-B8F9-454E-98B1-9FA33ABDF0BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_7:*:*:*:*:*:*",
              "matchCriteriaId": "42F0E1FF-0863-418C-BD26-F3B18B257370",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1:rc_8:*:*:*:*:*:*",
              "matchCriteriaId": "B0E905D4-34F6-4ACD-8D86-0C9E29EDB282",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en OpenVPN versiones 2.1-beta14 hasta 2.1-rc8, cuando se ejecuta en sistemas que no son Windows, permite a los servidores remotos ejecutar comandos arbitrarios por medio de la configuraci\u00f3n de directivas dise\u00f1adas (1) lladdr y (2) iproute, probablemente relacionadas con los metacaracteres de shell."
    }
  ],
  "evaluatorImpact": "The following events must take place for successful exploitation:\r\n1) the client has agreed to allow the server to push configuration directives to it by including \"pull\" or the macro \"client\" in its configuration file\r\n2) the client succesfully authenticates the server \r\n3) the server is malicious or has been compromised and is under the control of the attacker\r\n4) the client is running a non-Windows OS.",
  "id": "CVE-2008-3459",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-08-04T19:41:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://openvpn.net/index.php/documentation/change-log/changelog-21.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/30532"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1020626"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2316"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44209"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openvpn.net/index.php/documentation/change-log/changelog-21.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30532"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020626"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44209"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-16"
        },
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-05-15 18:29
Modified
2025-04-20 01:37
Summary
OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.
Impacted products
Vendor Product Version
openvpn openvpn *
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B92389B-7815-40EC-AA21-14154621BFAC",
              "versionEndIncluding": "2.3.14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F5C67A-34A4-4C7E-BCA9-AF3E5FC70AF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "A857CA88-60B0-4D34-87B6-770B67981501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B42297EE-B347-4BD8-A657-BDF0AA010C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "7C7A56E8-09C8-4DB2-9244-9E5E2BEC1821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "41ACD637-EF6B-40E4-BDE6-0EE7D6AEBAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1A4150AD-3F46-487D-BCF8-79D0AE2A092D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F7663E-3EB5-44F4-B7DE-294A549A12BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker."
    },
    {
      "lang": "es",
      "value": "OpenVPN versiones anteriores a 2.3.15 y anteriores a 2.4.2, son vulnerables a una aserci\u00f3n alcanzable cuando el contador del identificador de paquete se devuelve como resultado de una denegaci\u00f3n de servicio del servidor por parte de un atacante autenticado."
    }
  ],
  "id": "CVE-2017-7479",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-05-15T18:29:00.340",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2017/dsa-3900"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/98443"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1038473"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2017/dsa-3900"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/98443"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1038473"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-04-03 16:15
Modified
2025-04-29 19:45
Summary
OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges
Impacted products
Vendor Product Version
openvpn openvpn *
microsoft windows -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "C87B630D-FF25-4172-AE95-D5D93DF2286A",
              "versionEndExcluding": "2.6.11",
              "versionStartIncluding": "2.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges"
    },
    {
      "lang": "es",
      "value": "Las versiones 2.4.0 a 2.6.10 de OpenVPN en Windows permiten que un proceso externo con menos privilegios cree una tuber\u00eda con nombre a la que se conectar\u00eda el componente GUI de OpenVPN, lo que le permitir\u00eda escalar sus privilegios."
    }
  ],
  "id": "CVE-2024-4877",
  "lastModified": "2025-04-29T19:45:07.223",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-04-03T16:15:32.840",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Permissions Required"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-4877"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Release Notes",
        "Mailing List"
      ],
      "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-268"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-07-08 11:15
Modified
2024-11-21 09:05
Summary
OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service.
Impacted products
Vendor Product Version
openvpn openvpn *
openvpn openvpn *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "62343D14-4C89-4E6F-9C74-46E7EEAF79CB",
              "versionEndExcluding": "2.5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "0E77CFBC-2014-4588-B77C-C34E333645A7",
              "versionEndExcluding": "2.6.10",
              "versionStartIncluding": "2.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service."
    },
    {
      "lang": "es",
      "value": "Los complementos de OpenVPN en Windows con OpenVPN 2.6.9 y versiones anteriores se pueden cargar desde cualquier directorio, lo que permite a un atacante cargar un complemento arbitrario que puede usarse para interactuar con el servicio interactivo privilegiado OpenVPN."
    }
  ],
  "id": "CVE-2024-27903",
  "lastModified": "2024-11-21T09:05:23.177",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-07-08T11:15:10.390",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-27903"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Mailing List"
      ],
      "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-27903"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-283"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-434"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-06-27 13:29
Modified
2025-04-20 01:37
Summary
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet.
Impacted products
Vendor Product Version
openvpn openvpn *
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.1
openvpn openvpn 2.4.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "216840B9-FCDB-4921-BE12-2A1FA42F8FDE",
              "versionEndIncluding": "2.3.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F5C67A-34A4-4C7E-BCA9-AF3E5FC70AF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "A857CA88-60B0-4D34-87B6-770B67981501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B42297EE-B347-4BD8-A657-BDF0AA010C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "7C7A56E8-09C8-4DB2-9244-9E5E2BEC1821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "41ACD637-EF6B-40E4-BDE6-0EE7D6AEBAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1A4150AD-3F46-487D-BCF8-79D0AE2A092D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F7663E-3EB5-44F4-B7DE-294A549A12BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "81434C3E-F992-4F29-9092-6823989B6909",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet."
    },
    {
      "lang": "es",
      "value": "Las versiones anteriores a 2.4.3 y anterior a 2.3.17 de OpenVPN, son vulnerables a la denegaci\u00f3n de servicio remota cuando se reciben paquetes IPv6 malformados."
    }
  ],
  "id": "CVE-2017-7508",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-06-27T13:29:00.177",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2017/dsa-3900"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/99230"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1038768"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2017/dsa-3900"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/99230"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1038768"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-11 01:15
Modified
2025-06-11 15:15
Summary
Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "3A398A7A-395F-4CA8-9D72-1DDD337D5074",
              "versionEndIncluding": "2.6.6",
              "versionStartIncluding": "2.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54464223-5988-40E7-B94B-D7B8DE999704",
              "versionEndIncluding": "2.11.3",
              "versionStartIncluding": "2.11.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8A71564-0966-47F0-BB81-B6BFA071E402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn_access_server:2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC187755-A908-4CD5-8F35-869EA5D9A3B7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service."
    },
    {
      "lang": "es",
      "value": "El uso de la opci\u00f3n --fragment en ciertas configuraciones de OpenVPN versi\u00f3n 2.6.0 a 2.6.6 permite a un atacante desencadenar un comportamiento de divisi\u00f3n por cero que podr\u00eda provocar un bloqueo de la aplicaci\u00f3n y provocar una denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2023-46849",
  "lastModified": "2025-06-11T15:15:26.793",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-11-11T01:15:07.270",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-46849"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/"
    },
    {
      "source": "security@openvpn.net",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5555"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-46849"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5555"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-369"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-369"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-01-06 14:15
Modified
2025-06-10 16:26
Severity ?
Summary
OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.
Impacted products
Vendor Product Version
openvpn openvpn *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "0D6C4FD9-4627-4A45-89FC-2DB53985C516",
              "versionEndExcluding": "2.6.11",
              "versionStartIncluding": "2.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs."
    },
    {
      "lang": "es",
      "value": "OpenVPN anterior a 2.6.11 no desinfecta adecuadamente los mensajes PUSH_REPLY, lo cual los atacantes pueden usar para inyectar datos arbitrarios inesperados en ejecutables o complementos de terceros."
    }
  ],
  "id": "CVE-2024-5594",
  "lastModified": "2025-06-10T16:26:11.807",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-01-06T14:15:08.807",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-5594"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1287"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-08-24 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts.
Impacted products
Vendor Product Version
openvpn openvpn 2.0
openvpn openvpn 2.0.1_rc1
openvpn openvpn 2.0.1_rc2
openvpn openvpn 2.0.1_rc3
openvpn openvpn 2.0.1_rc4
openvpn openvpn 2.0.1_rc5
openvpn openvpn 2.0.1_rc6
openvpn openvpn 2.0.1_rc7
openvpn openvpn 2.0_beta1
openvpn openvpn 2.0_beta2
openvpn openvpn 2.0_beta3
openvpn openvpn 2.0_beta4
openvpn openvpn 2.0_beta5
openvpn openvpn 2.0_beta6
openvpn openvpn 2.0_beta7
openvpn openvpn 2.0_beta8
openvpn openvpn 2.0_beta9
openvpn openvpn 2.0_beta10
openvpn openvpn 2.0_beta11
openvpn openvpn 2.0_beta12
openvpn openvpn 2.0_beta13
openvpn openvpn 2.0_beta15
openvpn openvpn 2.0_beta16
openvpn openvpn 2.0_beta17
openvpn openvpn 2.0_beta18
openvpn openvpn 2.0_beta19
openvpn openvpn 2.0_beta20
openvpn openvpn 2.0_beta28
openvpn openvpn 2.0_rc1
openvpn openvpn 2.0_rc2
openvpn openvpn 2.0_rc3
openvpn openvpn 2.0_rc4
openvpn openvpn 2.0_rc5
openvpn openvpn 2.0_rc6
openvpn openvpn 2.0_rc7
openvpn openvpn 2.0_rc8
openvpn openvpn 2.0_rc9
openvpn openvpn 2.0_rc10
openvpn openvpn 2.0_rc11
openvpn openvpn 2.0_rc12
openvpn openvpn 2.0_rc13
openvpn openvpn 2.0_rc14
openvpn openvpn 2.0_rc15
openvpn openvpn 2.0_rc16
openvpn openvpn 2.0_rc17
openvpn openvpn 2.0_rc18
openvpn openvpn 2.0_rc19
openvpn openvpn 2.0_rc20
openvpn openvpn 2.0_rc21
openvpn openvpn 2.0_test1
openvpn openvpn 2.0_test2
openvpn openvpn 2.0_test3
openvpn openvpn 2.0_test5
openvpn openvpn 2.0_test6
openvpn openvpn 2.0_test7
openvpn openvpn 2.0_test8
openvpn openvpn 2.0_test9
openvpn openvpn 2.0_test10
openvpn openvpn 2.0_test11
openvpn openvpn 2.0_test12
openvpn openvpn 2.0_test14
openvpn openvpn 2.0_test15
openvpn openvpn 2.0_test16
openvpn openvpn 2.0_test17
openvpn openvpn 2.0_test18
openvpn openvpn 2.0_test19
openvpn openvpn 2.0_test20
openvpn openvpn 2.0_test21
openvpn openvpn 2.0_test22
openvpn openvpn 2.0_test23
openvpn openvpn 2.0_test24
openvpn openvpn 2.0_test26
openvpn openvpn 2.0_test27
openvpn openvpn 2.0_test29



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6457C946-123B-4B85-9253-D284A7A16A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0ECEAF-401A-434E-9B0A-1A234BAEFC4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E751FA0E-0DF4-4F81-912A-1A132640246D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F61AC6-EDF6-4818-BA51-3EAA299680B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32984D8-9631-407B-834E-303B9405A425",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB44A872-3FE2-47E9-BA84-B6E1015E1973",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F020080D-7181-400D-988E-6844D1653464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0.1_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D08038-9815-4222-9CD3-1211FE5954A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BDEBEDA-437A-4942-8A71-7B25DD558BCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EB8A78E-DAB9-4A72-BC54-58230E1E9B9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5D74ED1-34C5-4F95-A941-83664AFFF2ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0747C1A9-C404-4FBD-AA8F-9DBB70FEB4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3B1AD4-9EA0-4D86-90E1-3366FBC5629D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E483BD0-CAB9-4DA0-AAA4-A934B8318FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F04FAB1-A558-4F93-9FBF-043DE259A813",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A189A733-3130-41B4-94DD-E99E294D0FBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DEE5695-DC49-445D-864A-4739E16DF762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FBF146F-2CFA-4F14-BFBC-E01B58F9F72B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D263CA-8B2C-4B66-8990-6224BAF52A8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta12:*:*:*:*:*:*:*",
              "matchCriteriaId": "825C9FCE-AD76-4E32-8FEC-EEFA0662BC04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7519FA-831A-41D7-AFC3-B9457E6DFB4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta15:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB79AFD-493F-41F1-9EC1-8BCC0D28A914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C8F091B-194A-4FC5-87F4-A76CB490F3F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11716B49-A920-4A1B-BEA5-4105213B9731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta18:*:*:*:*:*:*:*",
              "matchCriteriaId": "756A7AF5-E502-4EDC-9693-4041C993E3BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta19:*:*:*:*:*:*:*",
              "matchCriteriaId": "9885BC3E-1854-4561-9906-FFAEECA5B6FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7B7759F-F228-436D-BC86-7317B0109C02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_beta28:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB9BD19-1BF9-42D0-9E43-7D95EE010347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0A6E23-6456-4305-A7DA-8CA1D506D4F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D985B9F0-5B4F-4120-8ECF-506C5F6179FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF7E6096-58BF-47F1-982B-27A9ED735AEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "62362541-FE20-47ED-9E03-94216A3D43CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BD7019-BBA5-4D08-85C8-571D2EC03FA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1D56A4-A03C-445C-993B-1AA12024D4FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F563B1FD-FC1F-4304-8141-A1188A190835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4269ED1A-3031-4572-B134-62C6E533D176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc9:*:*:*:*:*:*:*",
              "matchCriteriaId": "140999A7-E9BB-4459-B3F8-48DF8F5DFE0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc10:*:*:*:*:*:*:*",
              "matchCriteriaId": "41CD75B0-24D0-40BA-A4FB-925BD5414298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc11:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED8F3C5-8E43-4B07-8224-38BF4774F4CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC88614-E782-447B-B854-955498FAAA13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C1B8EE-3C12-452F-986E-6FD8A230685A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc14:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AC6851-F63E-47D7-BDEF-3BFF39E94D9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc15:*:*:*:*:*:*:*",
              "matchCriteriaId": "685F5555-793D-4FAA-8CF4-578490CFAC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E688CF0C-134B-49E2-AEB3-45ECACB8B5FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D385327-D1FF-4A22-A0C0-0C5AA53590C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc18:*:*:*:*:*:*:*",
              "matchCriteriaId": "51329755-1DBF-40E1-960C-E924CDC4B22C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc19:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE65AC5-C218-456F-86FB-1C8BEC3C4598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1412133F-3B44-43B6-A4FF-FF80E7B564E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_rc21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B55EE355-28A1-4955-9ADD-A8E02376C9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E942C13E-6B54-465F-8026-ED49BD7EA2F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AADF30CF-AD36-45EB-AF50-EB0533B20B70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD078F82-361C-4B38-86E8-85E129F41A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9831C92-7717-4650-8689-3C41B773C5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3521E7-572E-4ADD-AAF6-F1AE505B4BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73290B2-384B-4B0F-8763-EF4D5D7C39FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4728B3CD-5B54-4B0B-8967-DE7D9E1474F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F353B495-D69A-4831-9E5B-F15F8F749C84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test10:*:*:*:*:*:*:*",
              "matchCriteriaId": "16647409-3ADD-4E86-A053-4A7B8365700E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5CA9F6-68FE-4412-8CD5-F85E970249F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test12:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A74354-1EAB-4A4F-A79C-C04E9BCDF594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test14:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A016A3-CAA9-4FCB-B909-F4163CE1E19E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test15:*:*:*:*:*:*:*",
              "matchCriteriaId": "82A53B7C-8E9D-4DD6-8B00-628F7796A365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D5AADA5-05DA-4660-9636-A3B737916A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test17:*:*:*:*:*:*:*",
              "matchCriteriaId": "2778FEDE-063B-4454-9FA7-F526334CF9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test18:*:*:*:*:*:*:*",
              "matchCriteriaId": "989D471D-3F81-4018-A124-7FBEB3F4AB87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test19:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4EA97AE-B2DD-40F8-81E1-467E895CE736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C82A6A-4548-4508-B337-1061E57D78AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test21:*:*:*:*:*:*:*",
              "matchCriteriaId": "36A972BC-6956-4195-933C-F3694BFEFB50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9EF5187-C008-4927-B5CB-A491768E9822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test23:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A39ECE-7C8D-4BB8-A408-08EA0879F03F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test24:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C67474C-3274-4F62-AF98-6953F9744522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test26:*:*:*:*:*:*:*",
              "matchCriteriaId": "D799CAF5-BFC3-4A80-8AE2-D292B7F9D9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test27:*:*:*:*:*:*:*",
              "matchCriteriaId": "98D3B905-FCD7-4136-A94C-76A95994CD85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.0_test29:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE172A1-D9A5-4FF7-B316-4E0BD639B35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN before 2.0.1, when running with \"verb 0\" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts."
    }
  ],
  "id": "CVE-2005-2531",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-24T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://openvpn.net/changelog.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/16463"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17103"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-851"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2005_20_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14605"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openvpn.net/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/16463"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17103"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2005_20_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14605"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-06-27 13:29
Modified
2025-04-20 01:37
Summary
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker.
Impacted products
Vendor Product Version
openvpn openvpn *
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.1
openvpn openvpn 2.4.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "216840B9-FCDB-4921-BE12-2A1FA42F8FDE",
              "versionEndIncluding": "2.3.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F5C67A-34A4-4C7E-BCA9-AF3E5FC70AF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "A857CA88-60B0-4D34-87B6-770B67981501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B42297EE-B347-4BD8-A657-BDF0AA010C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "7C7A56E8-09C8-4DB2-9244-9E5E2BEC1821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "41ACD637-EF6B-40E4-BDE6-0EE7D6AEBAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1A4150AD-3F46-487D-BCF8-79D0AE2A092D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F7663E-3EB5-44F4-B7DE-294A549A12BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "81434C3E-F992-4F29-9092-6823989B6909",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker."
    },
    {
      "lang": "es",
      "value": "Las versiones anteriores a 2.4.3 y anterior a 2.3.17 de OpenVPN, son vulnerables a la denegaci\u00f3n de servicio y/o posiblemente a la p\u00e9rdida de memoria confidencial activada por un atacante de tipo man-in-the-middle."
    }
  ],
  "id": "CVE-2017-7520",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-06-27T13:29:00.210",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2017/dsa-3900"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/99230"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1038768"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2017/dsa-3900"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/99230"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1038768"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-01-31 22:59
Modified
2025-04-20 01:37
Summary
OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
References
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=nas8N1021697Permissions Required, Third Party Advisory
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21991482Third Party Advisory
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21995039Third Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/92631Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id/1036695Third Party Advisory, VDB Entry
secalert@redhat.comhttps://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
secalert@redhat.comhttps://community.openvpn.net/openvpn/wiki/SWEET32Vendor Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403Third Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/201611-02Third Party Advisory
secalert@redhat.comhttps://sweet32.info/Technical Description, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697Permissions Required, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21991482Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21995039Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/92631Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1036695Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
af854a3a-2127-422b-91ae-364da2661108https://community.openvpn.net/openvpn/wiki/SWEET32Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201611-02Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://sweet32.info/Technical Description, Third Party Advisory
Impacted products
Vendor Product Version
openvpn openvpn *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B92389B-7815-40EC-AA21-14154621BFAC",
              "versionEndIncluding": "2.3.14",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a \"Sweet32\" attack."
    },
    {
      "lang": "es",
      "value": "OpenVPN, cuando utiliza un cifrado de bloques de 64 bits, facilita a atacantes remotos obtener datos de texto plano a trav\u00e9s de un ataque birthday contra una sesi\u00f3n encriptada de larga duraci\u00f3n, como lo demuestra una sesi\u00f3n HTTP-over-OpenVPN usando Blowfish en modo CBC, tambi\u00e9n conocido como ataque \"Sweet32\"."
    }
  ],
  "id": "CVE-2016-6329",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-01-31T22:59:00.377",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21991482"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/92631"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1036695"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/SWEET32"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201611-02"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://sweet32.info/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21991482"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/92631"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1036695"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/SWEET32"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201611-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://sweet32.info/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        },
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-22 19:16
Modified
2024-11-21 05:12
Summary
Control Channel in OpenVPN 2.4.7 and earlier allows remote attackers to cause a denial of service via crafted reset packet.
Impacted products
Vendor Product Version
openvpn openvpn *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFC97CFC-E7F4-428D-AFDE-DFEC100A7728",
              "versionEndIncluding": "2.4.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Control Channel in OpenVPN 2.4.7 and earlier allows remote attackers to cause a denial of service via crafted reset packet."
    },
    {
      "lang": "es",
      "value": "El componente Control Channel de OpenVPN v2.4.7 y anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de un paquete de restablecimiento manipulado."
    }
  ],
  "id": "CVE-2020-20813",
  "lastModified": "2024-11-21T05:12:17.083",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-22T19:16:08.247",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.freebuf.com/vuls/215171.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.freebuf.com/vuls/215171.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-06-27 13:29
Modified
2025-04-20 01:37
Summary
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service by authenticated remote attacker via sending a certificate with an embedded NULL character.
Impacted products
Vendor Product Version
openvpn openvpn *
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.0
openvpn openvpn 2.4.1
openvpn openvpn 2.4.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "216840B9-FCDB-4921-BE12-2A1FA42F8FDE",
              "versionEndIncluding": "2.3.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F5C67A-34A4-4C7E-BCA9-AF3E5FC70AF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "A857CA88-60B0-4D34-87B6-770B67981501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B42297EE-B347-4BD8-A657-BDF0AA010C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "7C7A56E8-09C8-4DB2-9244-9E5E2BEC1821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "41ACD637-EF6B-40E4-BDE6-0EE7D6AEBAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1A4150AD-3F46-487D-BCF8-79D0AE2A092D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F7663E-3EB5-44F4-B7DE-294A549A12BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "81434C3E-F992-4F29-9092-6823989B6909",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service by authenticated remote attacker via sending a certificate with an embedded NULL character."
    },
    {
      "lang": "es",
      "value": "Las versiones de OpenVPN anteriores a 2.4.3 y 2.3.17, son vulnerables a una denegaci\u00f3n de servicio por parte de un atacante remoto autenticado mediante el env\u00edo de un certificado con un car\u00e1cter NULL insertado."
    }
  ],
  "id": "CVE-2017-7522",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-06-27T13:29:00.273",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/99230"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1038768"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/99230"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1038768"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-16 15:29
Modified
2024-11-21 04:12
Severity ?
Summary
A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a "signal SIGTERM" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning
Impacted products
Vendor Product Version
openvpn openvpn *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE001042-A74F-441C-8ED2-B4CF71299080",
              "versionEndIncluding": "2.4.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a \"signal SIGTERM\" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning"
    },
    {
      "lang": "es",
      "value": "** EN DISPUTA ** Se ha descubierto un problema en la interfaz de gesti\u00f3n en OpenVPN hasta la versi\u00f3n 2.4.5. Cuando esta interfaz est\u00e1 habilitada en TCP sin contrase\u00f1a y cuando no hay m\u00e1s clientes conectados a esta interfaz, los atacantes pueden ejecutar comandos arbitrarios de gesti\u00f3n, obtener informaci\u00f3n sensible o provocar una denegaci\u00f3n de servicio (SIGTERM) al desencadenar acciones XMLHttpRequest en un navegador web. Esto se demuestra mediante un POST multipart/form-data en http://localhost:23000 con un comando \"signal SIGTERM\" en un elemento TEXTAREA. NOTA: El fabricante discute que esto sea una vulnerabilidad. Afirman que este es el resultado de una configuraci\u00f3n incorrecta de la instancia OpenVPN en lugar de una vulnerabilidad intr\u00ednseca; ahora advierten de forma a\u00fan m\u00e1s expl\u00edcita contra tal configuraci\u00f3n, tanto en la documentaci\u00f3n de la interfaz de gesti\u00f3n como en un mensaje runtime."
    }
  ],
  "id": "CVE-2018-7544",
  "lastModified": "2024-11-21T04:12:20.183",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-16T15:29:00.247",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://blog.0xlabs.com/2018/03/openvpn-remote-information-disclosure.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://blog.0xlabs.com/2018/03/openvpn-remote-information-disclosure.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-07-08 11:15
Modified
2024-11-21 09:00
Summary
The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.
Impacted products
Vendor Product Version
openvpn openvpn *
openvpn openvpn *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "62343D14-4C89-4E6F-9C74-46E7EEAF79CB",
              "versionEndExcluding": "2.5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "0E77CFBC-2014-4588-B77C-C34E333645A7",
              "versionEndExcluding": "2.6.10",
              "versionStartIncluding": "2.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service."
    },
    {
      "lang": "es",
      "value": "El servicio interactivo en OpenVPN 2.6.9 y versiones anteriores permite acceder remotamente al canal del servicio OpenVPN, lo que permite a un atacante remoto interactuar con el servicio interactivo privilegiado OpenVPN."
    }
  ],
  "id": "CVE-2024-24974",
  "lastModified": "2024-11-21T09:00:04.127",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-07-08T11:15:10.103",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-24974"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Mailing List"
      ],
      "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-24974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-923"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-08-25 16:55
Modified
2025-04-12 10:46
Severity ?
Summary
Unquoted Windows search path vulnerability in the ptservice service prior to PrivateTunnel version 3.0 (Windows) and OpenVPN Connect version 3.1 (Windows) allows local users to gain privileges via a crafted program.exe file in the %SYSTEMDRIVE% folder.
Impacted products
Vendor Product Version
openvpn openvpn 2.1.28.0
privatetunnel privatetunnel 2.3.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:openvpn:2.1.28.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F249DC64-DBC5-4520-9351-224E51A21EC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:privatetunnel:privatetunnel:2.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "543391ED-92D8-439F-8B96-EE0F956C2C64",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unquoted Windows search path vulnerability in the ptservice service prior to PrivateTunnel version 3.0 (Windows) and OpenVPN Connect version 3.1 (Windows) allows local users to gain privileges via a crafted program.exe file in the %SYSTEMDRIVE% folder."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de la ruta de b\u00fasqueda de Windows sin entrecomillar en el servicio ptservice anterior a la versi\u00f3n 3.0 de PrivateTunnel (Windows) y a la versi\u00f3n 3.1 de OpenVPN Connect (Windows) permite a los usuarios locales obtener privilegios a trav\u00e9s de un archivo program.exe en la carpeta %SYSTEMDRIVE%."
    }
  ],
  "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/428.html\" target=\"_blank\"\u003eCWE-428: Unquoted Search Path or Element\u003c/a\u003e",
  "id": "CVE-2014-5455",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-08-25T16:55:04.977",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/show/osvdb/109007"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.com/files/127439/OpenVPN-Private-Tunnel-Privilege-Escalation.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/34037"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5192.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/CVEProject/cvelist/pull/3909"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/CVEProject/cvelist/pull/3909/commits/ace34f1cf94602f31760d3eb7ae68e17df8f914d"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05325943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/show/osvdb/109007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.com/files/127439/OpenVPN-Private-Tunnel-Privilege-Escalation.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/34037"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5192.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/CVEProject/cvelist/pull/3909"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/CVEProject/cvelist/pull/3909/commits/ace34f1cf94602f31760d3eb7ae68e17df8f914d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05325943"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-428"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}