Описание
Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.6.15 and 2.7_alpha1 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client
A flaw was found in OpenVPN. This vulnerability allows a denial of service (DoS) for the originating client via improper validation of source Internet Protocol (IP) addresses, allowing an attacker to open a session from a different IP address which did not initiate the connection.
Отчет
This vulnerability is rated Moderate for Red Hat. Improper validation of source IP addresses in OpenVPN allows an attacker to open a session from a different IP address, leading to a denial of service for the originating client. This affects OpenVPN deployments where client source IP address validation is critical for session integrity.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Ссылки на источники
Дополнительная информация
Статус:
6.5 Medium
CVSS3
Связанные уязвимости
Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.6.15 and 2.7_alpha1 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client
Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.6.15 and 2.7_alpha1 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client
Improper validation of source IP addresses in OpenVPN version 2.6.0 th ...
6.5 Medium
CVSS3