Количество 203
Количество 203
CVE-2005-2533
OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses.
CVE-2005-2533
OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode ...
CVE-2005-2532
OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted.
CVE-2005-2532
OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted.
CVE-2005-2532
OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue w ...
CVE-2005-2531
OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts.
CVE-2005-2531
OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts.
CVE-2005-2531
OpenVPN before 2.0.1, when running with "verb 0" and without TLS authe ...
BDU:2025-14653
Уязвимость функции memcmp() программного обеспечения OpenVPN, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2025-13551
Уязвимость компонента --dns-updown программного обеспечения OpenVPN, позволяющая нарушителю выполнить произвольный код
BDU:2025-07445
Уязвимость драйвера ovpn-dco-win программного обеспечения OpenVPN, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03572
Уязвимость библиотеки OpenSSL программного обеспечения OpenVPN, позволяющая нарушителю выполнить произвольный код
GHSA-q6wh-cc86-fx6h
OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service.
GHSA-p99v-qjfm-8vvq
Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.
GHSA-p2qj-cw7j-f6wr
OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
GHSA-mww5-q78w-ffpv
Unquoted Windows search path vulnerability in the ptservice service prior to PrivateTunnel version 3.0 (Windows) and OpenVPN Connect version 3.1 (Windows) allows local users to gain privileges via a crafted program.exe file in the %SYSTEMDRIVE% folder.
GHSA-jg57-vh55-3g23
Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.
GHSA-j3mr-328w-64j3
The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher.
GHSA-8fqr-f734-rf7m
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
GHSA-5cc7-3r85-874q
OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2005-2533 OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses. | CVSS2: 2.1 | 0% Низкий | больше 20 лет назад | |
CVE-2005-2533 OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode ... | CVSS2: 2.1 | 0% Низкий | больше 20 лет назад | |
CVE-2005-2532 OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted. | CVSS2: 5 | 1% Низкий | больше 20 лет назад | |
CVE-2005-2532 OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted. | CVSS2: 5 | 1% Низкий | больше 20 лет назад | |
CVE-2005-2532 OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue w ... | CVSS2: 5 | 1% Низкий | больше 20 лет назад | |
CVE-2005-2531 OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts. | CVSS2: 5 | 1% Низкий | больше 20 лет назад | |
CVE-2005-2531 OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts. | CVSS2: 5 | 1% Низкий | больше 20 лет назад | |
CVE-2005-2531 OpenVPN before 2.0.1, when running with "verb 0" and without TLS authe ... | CVSS2: 5 | 1% Низкий | больше 20 лет назад | |
BDU:2025-14653 Уязвимость функции memcmp() программного обеспечения OpenVPN, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 7.3 | 0% Низкий | 3 месяца назад | |
BDU:2025-13551 Уязвимость компонента --dns-updown программного обеспечения OpenVPN, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.8 | 0% Низкий | 4 месяца назад | |
BDU:2025-07445 Уязвимость драйвера ovpn-dco-win программного обеспечения OpenVPN, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | 8 месяцев назад | |
BDU:2021-03572 Уязвимость библиотеки OpenSSL программного обеспечения OpenVPN, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад | |
GHSA-q6wh-cc86-fx6h OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service. | 1% Низкий | почти 4 года назад | ||
GHSA-p99v-qjfm-8vvq Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service. | CVSS3: 7.5 | 0% Низкий | около 2 лет назад | |
GHSA-p2qj-cw7j-f6wr OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet. | 2% Низкий | больше 3 лет назад | ||
GHSA-mww5-q78w-ffpv Unquoted Windows search path vulnerability in the ptservice service prior to PrivateTunnel version 3.0 (Windows) and OpenVPN Connect version 3.1 (Windows) allows local users to gain privileges via a crafted program.exe file in the %SYSTEMDRIVE% folder. | 1% Низкий | больше 3 лет назад | ||
GHSA-jg57-vh55-3g23 Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer. | CVSS3: 9.8 | 2% Низкий | около 2 лет назад | |
GHSA-j3mr-328w-64j3 The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher. | 1% Низкий | больше 3 лет назад | ||
GHSA-8fqr-f734-rf7m OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable. | 4% Низкий | почти 4 года назад | ||
GHSA-5cc7-3r85-874q OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler. | 3% Низкий | почти 4 года назад |
Уязвимостей на страницу