Описание
OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase
Релиз | Статус | Примечание |
---|---|---|
devel | released | 2.6.13-1ubuntu3 |
esm-infra-legacy/trusty | not-affected | |
esm-infra/bionic | not-affected | |
esm-infra/focal | not-affected | 2.4.12-0ubuntu0.20.04.2 |
esm-infra/xenial | not-affected | |
focal | not-affected | 2.4.12-0ubuntu0.20.04.2 |
jammy | not-affected | 2.5.11-0ubuntu0.22.04.1 |
noble | released | 2.6.12-0ubuntu0.24.04.3 |
oracular | released | 2.6.12-1ubuntu1.2 |
upstream | released | 2.6.14 |
Показывать по
EPSS
7.5 High
CVSS3
Связанные уязвимости
OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase
OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 ...
OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase
EPSS
7.5 High
CVSS3