Описание
Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client
| Релиз | Статус | Примечание |
|---|---|---|
| devel | pending | 2.7.0~rc2-2ubuntu1 |
| esm-infra-legacy/trusty | needs-triage | |
| esm-infra/bionic | not-affected | |
| esm-infra/focal | not-affected | |
| esm-infra/xenial | not-affected | |
| jammy | not-affected | 2.5.11-0ubuntu0.22.04.1 |
| noble | released | 2.6.14-0ubuntu0.24.04.3 |
| plucky | released | 2.6.14-0ubuntu0.25.04.3 |
| questing | released | 2.6.14-2ubuntu1.1 |
| upstream | released | 2.7.0,2.6.16,2.7.0~rc2-2 |
Показывать по
EPSS
Связанные уязвимости
Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.6.15 and 2.7_alpha1 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client
Improper validation of source IP addresses in OpenVPN version 2.6.0 th ...
Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client
Уязвимость функции memcmp() программного обеспечения OpenVPN, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
EPSS