Логотип exploitDog
product: "openvpn"
Консоль
Логотип exploitDog

exploitDog

product: "openvpn"
OpenVPN

OpenVPNсвободная реализация технологии виртуальной частной сети (VPN) с открытым исходным кодом для создания зашифрованных каналoв типа точка-точка или сервер-клиенты между компьютерами.

Релизный цикл, информация об уязвимостях

Продукт: OpenVPN
Вендор: openvpn

График релизов

2.12.22.32.42.52.62009201020112012201320142015201620172018201920202021202220232024202520262027

Недавние уязвимости OpenVPN

Количество 203

nvd логотип

CVE-2018-9336

почти 8 лет назад

openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2018-9336

почти 8 лет назад

openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2018-9336

почти 8 лет назад

openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2018-7544

почти 8 лет назад

A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a "signal SIGTERM" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning

CVSS3: 9.1
EPSS: Низкий
debian логотип

CVE-2018-7544

почти 8 лет назад

A cross-protocol scripting issue was discovered in the management inte ...

CVSS3: 9.1
EPSS: Низкий
ubuntu логотип

CVE-2018-7544

почти 8 лет назад

A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a "signal SIGTERM" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning

CVSS3: 9.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:3177-1

около 8 лет назад

Security update for openvpn-openssl1

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:2892-1

больше 8 лет назад

Security update for openvpn

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:2839-1

больше 8 лет назад

Security update for openvpn

EPSS: Низкий
nvd логотип

CVE-2017-12166

больше 8 лет назад

OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2018-9336

openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation.

CVSS3: 7.8
0%
Низкий
почти 8 лет назад
debian логотип
CVE-2018-9336

openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x ...

CVSS3: 7.8
0%
Низкий
почти 8 лет назад
ubuntu логотип
CVE-2018-9336

openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation.

CVSS3: 7.8
0%
Низкий
почти 8 лет назад
nvd логотип
CVE-2018-7544

A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a "signal SIGTERM" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning

CVSS3: 9.1
0%
Низкий
почти 8 лет назад
debian логотип
CVE-2018-7544

A cross-protocol scripting issue was discovered in the management inte ...

CVSS3: 9.1
0%
Низкий
почти 8 лет назад
ubuntu логотип
CVE-2018-7544

A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a "signal SIGTERM" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning

CVSS3: 9.1
0%
Низкий
почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:3177-1

Security update for openvpn-openssl1

2%
Низкий
около 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:2892-1

Security update for openvpn

2%
Низкий
больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:2839-1

Security update for openvpn

2%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-12166

OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.

CVSS3: 9.8
2%
Низкий
больше 8 лет назад

Уязвимостей на страницу


Поделиться