OpenVPN — свободная реализация технологии виртуальной частной сети (VPN) с открытым исходным кодом для создания зашифрованных каналoв типа точка-точка или сервер-клиенты между компьютерами.
Релизный цикл, информация об уязвимостях
График релизов
Количество 186
GHSA-8fqr-f734-rf7m
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
GHSA-5cc7-3r85-874q
OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.
GHSA-26pq-368c-c8f2
Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option.
GHSA-q7pv-xr8p-6j5f
OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses.
GHSA-86x4-whvc-8cfg
OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted.
GHSA-gj66-3prg-44gq
Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate.
GHSA-h572-qc5h-fc64
OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts.

SUSE-SU-2022:14937-1
Security update for openvpn-openssl1

SUSE-SU-2022:1029-1
Security update for openvpn

openSUSE-SU-2022:1029-1
Security update for openvpn
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
---|---|---|---|---|
GHSA-8fqr-f734-rf7m OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable. | 5% Низкий | около 3 лет назад | ||
GHSA-5cc7-3r85-874q OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler. | 3% Низкий | около 3 лет назад | ||
GHSA-26pq-368c-c8f2 Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option. | 2% Низкий | около 3 лет назад | ||
GHSA-q7pv-xr8p-6j5f OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses. | 0% Низкий | около 3 лет назад | ||
GHSA-86x4-whvc-8cfg OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted. | 1% Низкий | около 3 лет назад | ||
GHSA-gj66-3prg-44gq Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate. | 1% Низкий | около 3 лет назад | ||
GHSA-h572-qc5h-fc64 OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts. | 1% Низкий | около 3 лет назад | ||
![]() | SUSE-SU-2022:14937-1 Security update for openvpn-openssl1 | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:1029-1 Security update for openvpn | 0% Низкий | около 3 лет назад | |
![]() | openSUSE-SU-2022:1029-1 Security update for openvpn | 0% Низкий | около 3 лет назад |
Уязвимостей на страницу