Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2006-2229

Опубликовано: 05 мая 2006
Источник: nvd
CVSS2: 4
EPSS Низкий

Описание

OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0.1_rc1:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0.1_rc2:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0.1_rc3:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0.1_rc4:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0.1_rc5:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0.1_rc6:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0.1_rc7:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0.2_rc1:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0.3_rc1:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0.6_rc1:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta1:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta2:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta3:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta4:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta5:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta6:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta7:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta8:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta9:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta10:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta11:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta12:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta13:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta15:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta16:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta17:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta18:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta19:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta20:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_beta28:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc1:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc2:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc3:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc4:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc5:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc6:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc7:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc8:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc9:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc10:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc11:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc12:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc13:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc14:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc15:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc16:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc17:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc18:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc19:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc20:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_rc21:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test1:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test2:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test3:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test4:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test5:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test6:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test7:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test8:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test9:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test10:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test11:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test12:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test14:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test15:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test16:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test17:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test18:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test19:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test20:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test21:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test22:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test23:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test24:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test25:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test26:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test27:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn:2.0_test29:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:2.0.7:*:*:*:*:*:*:*

EPSS

Процентиль: 75%
0.00911
Низкий

4 Medium

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

debian
около 19 лет назад

OpenVPN 2.0.7 and earlier, when configured to use the --management opt ...

github
около 3 лет назад

OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service.

EPSS

Процентиль: 75%
0.00911
Низкий

4 Medium

CVSS2

Дефекты

NVD-CWE-Other