Total
30 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2013-2061 | 2 Opensuse, Openvpn | 3 Opensuse, Openvpn, Openvpn Access Server | 2023-12-10 | 2.6 LOW | N/A |
The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher. | |||||
CVE-2008-3459 | 1 Openvpn | 1 Openvpn | 2023-12-10 | 7.6 HIGH | N/A |
Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters. | |||||
CVE-2005-3409 | 1 Openvpn | 2 Openvpn, Openvpn Access Server | 2023-12-10 | 5.0 MEDIUM | N/A |
OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler. | |||||
CVE-2006-1629 | 1 Openvpn | 2 Openvpn, Openvpn Access Server | 2023-12-10 | 9.0 HIGH | N/A |
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable. | |||||
CVE-2005-2534 | 1 Openvpn | 1 Openvpn | 2023-12-10 | 2.6 LOW | N/A |
Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate. | |||||
CVE-2005-3393 | 1 Openvpn | 2 Openvpn, Openvpn Access Server | 2023-12-10 | 7.5 HIGH | N/A |
Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option. | |||||
CVE-2005-2533 | 1 Openvpn | 1 Openvpn | 2023-12-10 | 2.1 LOW | N/A |
OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses. | |||||
CVE-2005-2532 | 1 Openvpn | 1 Openvpn | 2023-12-10 | 5.0 MEDIUM | N/A |
OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted. | |||||
CVE-2005-2531 | 1 Openvpn | 1 Openvpn | 2023-12-10 | 5.0 MEDIUM | N/A |
OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts. | |||||
CVE-2006-2229 | 1 Openvpn | 2 Openvpn, Openvpn Access Server | 2023-12-10 | 4.0 MEDIUM | N/A |
OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service. |