Описание
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
Ссылки
- Patch
- PatchVendor Advisory
- Patch
- Patch
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:2.0.5:*:*:*:*:*:*:*
EPSS
Процентиль: 89%
0.04757
Низкий
9 Critical
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
ubuntu
около 19 лет назад
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
debian
около 19 лет назад
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute a ...
github
около 3 лет назад
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
EPSS
Процентиль: 89%
0.04757
Низкий
9 Critical
CVSS2
Дефекты
NVD-CWE-Other