Описание
Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | code not present |
| esm-infra-legacy/trusty | not-affected | code not present |
| esm-infra/bionic | not-affected | code not present |
| esm-infra/focal | not-affected | code not present |
| esm-infra/xenial | not-affected | code not present |
| jammy | not-affected | code not present |
| noble | not-affected | code not present |
| plucky | not-affected | code not present |
| questing | not-affected | code not present |
| upstream | not-affected | debian: Vulnerable code only in 2.7 upstream |
Показывать по
9.1 Critical
CVSS3
Связанные уязвимости
Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses
Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 ...
Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses
Уязвимость функции get_addr_generic() программного обеспечения OpenVPN, позволяющая нарушителю раскрыть информацию об IP-адресации и вызвать отказ в обслуживании
9.1 Critical
CVSS3