Логотип exploitDog
product: "openvpn"
Консоль
Логотип exploitDog

exploitDog

product: "openvpn"
OpenVPN

OpenVPNсвободная реализация технологии виртуальной частной сети (VPN) с открытым исходным кодом для создания зашифрованных каналoв типа точка-точка или сервер-клиенты между компьютерами.

Релизный цикл, информация об уязвимостях

Продукт: OpenVPN
Вендор: openvpn

График релизов

2.12.22.32.42.52.6200920102011201220132014201520162017201820192020202120222023202420252026

Недавние уязвимости OpenVPN

Количество 188

github логотип

GHSA-w779-ggw7-rxjh

больше 3 лет назад

Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters.

EPSS: Низкий
github логотип

GHSA-q6wh-cc86-fx6h

больше 3 лет назад

OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service.

EPSS: Низкий
github логотип

GHSA-8fqr-f734-rf7m

больше 3 лет назад

OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.

EPSS: Низкий
github логотип

GHSA-5cc7-3r85-874q

больше 3 лет назад

OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.

EPSS: Низкий
github логотип

GHSA-26pq-368c-c8f2

больше 3 лет назад

Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option.

EPSS: Низкий
github логотип

GHSA-q7pv-xr8p-6j5f

больше 3 лет назад

OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses.

EPSS: Низкий
github логотип

GHSA-gj66-3prg-44gq

больше 3 лет назад

Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate.

EPSS: Низкий
github логотип

GHSA-86x4-whvc-8cfg

больше 3 лет назад

OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted.

EPSS: Низкий
github логотип

GHSA-h572-qc5h-fc64

больше 3 лет назад

OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts.

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:14937-1

больше 3 лет назад

Security update for openvpn-openssl1

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-w779-ggw7-rxjh

Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-q6wh-cc86-fx6h

OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-8fqr-f734-rf7m

OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.

4%
Низкий
больше 3 лет назад
github логотип
GHSA-5cc7-3r85-874q

OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-26pq-368c-c8f2

Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-q7pv-xr8p-6j5f

OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-gj66-3prg-44gq

Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-86x4-whvc-8cfg

OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-h572-qc5h-fc64

OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts.

1%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:14937-1

Security update for openvpn-openssl1

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу


Поделиться