Описание
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
Ссылки
- Patch
- PatchVendor Advisory
- Patch
- Patch
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:2.0.5:*:*:*:*:*:*:*
EPSS
Процентиль: 87%
0.0356
Низкий
9 Critical
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
ubuntu
почти 20 лет назад
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
debian
почти 20 лет назад
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute a ...
github
почти 4 года назад
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
EPSS
Процентиль: 87%
0.0356
Низкий
9 Critical
CVSS2
Дефекты
NVD-CWE-Other