Логотип exploitDog
product: "openvpn"
Консоль
Логотип exploitDog

exploitDog

product: "openvpn"

Количество 203

Количество 203

github логотип

GHSA-xg3m-85r2-236x

2 месяца назад

Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-w779-ggw7-rxjh

почти 4 года назад

Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters.

EPSS: Низкий
github логотип

GHSA-w6pr-cm6j-f384

больше 3 лет назад

OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-vffw-rxx6-r4pj

почти 4 года назад

OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-v34q-j8xh-hjgx

больше 1 года назад

OpenVPN 2.6.10 and earlier in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-r2jp-995w-h282

больше 3 лет назад

OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-qhqf-49x5-89w6

больше 3 лет назад

OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-q7pv-xr8p-6j5f

почти 4 года назад

OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses.

EPSS: Низкий
github логотип

GHSA-q55c-22v4-x379

больше 3 лет назад

OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-mmxr-6344-9fv5

больше 3 лет назад

OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension().

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-mfqw-44wg-mrpf

больше 1 года назад

The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-hm8q-rqmm-26hq

больше 3 лет назад

Arbitrary File Write exists in Aviatrix VPN Client 2.8.2 and earlier. The VPN service writes logs to a location that is world writable and can be leveraged to gain write access to any file on the system.

EPSS: Низкий
github логотип

GHSA-h572-qc5h-fc64

почти 4 года назад

OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts.

EPSS: Низкий
github логотип

GHSA-gj66-3prg-44gq

почти 4 года назад

Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate.

EPSS: Низкий
github логотип

GHSA-g28r-w65r-h89m

почти 4 года назад

OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-f6v5-hjxr-p24j

больше 1 года назад

The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-f2h8-4w6p-535w

около 1 года назад

OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-c6pr-p5hf-w49p

больше 3 лет назад

OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service by authenticated remote attacker via sending a certificate with an embedded NULL character.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-c26r-vw7p-2m7h

10 месяцев назад

OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-9vqg-v7fx-9jvr

больше 3 лет назад

** DISPUTED ** A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a "signal SIGTERM" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning.

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xg3m-85r2-236x

Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses

CVSS3: 9.1
0%
Низкий
2 месяца назад
github логотип
GHSA-w779-ggw7-rxjh

Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters.

1%
Низкий
почти 4 года назад
github логотип
GHSA-w6pr-cm6j-f384

OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.

CVSS3: 5.9
1%
Низкий
больше 3 лет назад
github логотип
GHSA-vffw-rxx6-r4pj

OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.

CVSS3: 8.1
2%
Низкий
почти 4 года назад
github логотип
GHSA-v34q-j8xh-hjgx

OpenVPN 2.6.10 and earlier in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session

CVSS3: 4.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-r2jp-995w-h282

OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-qhqf-49x5-89w6

OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.

CVSS3: 6.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-q7pv-xr8p-6j5f

OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses.

0%
Низкий
почти 4 года назад
github логотип
GHSA-q55c-22v4-x379

OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-mmxr-6344-9fv5

OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension().

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
github логотип
GHSA-mfqw-44wg-mrpf

The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.

CVSS3: 7.5
11%
Средний
больше 1 года назад
github логотип
GHSA-hm8q-rqmm-26hq

Arbitrary File Write exists in Aviatrix VPN Client 2.8.2 and earlier. The VPN service writes logs to a location that is world writable and can be leveraged to gain write access to any file on the system.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-h572-qc5h-fc64

OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts.

1%
Низкий
почти 4 года назад
github логотип
GHSA-gj66-3prg-44gq

Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate.

1%
Низкий
почти 4 года назад
github логотип
GHSA-g28r-w65r-h89m

OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.

CVSS3: 9.8
1%
Низкий
почти 4 года назад
github логотип
GHSA-f6v5-hjxr-p24j

The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.

CVSS3: 7.8
5%
Низкий
больше 1 года назад
github логотип
GHSA-f2h8-4w6p-535w

OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins.

CVSS3: 9.1
0%
Низкий
около 1 года назад
github логотип
GHSA-c6pr-p5hf-w49p

OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service by authenticated remote attacker via sending a certificate with an embedded NULL character.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-c26r-vw7p-2m7h

OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges

CVSS3: 8.8
0%
Низкий
10 месяцев назад
github логотип
GHSA-9vqg-v7fx-9jvr

** DISPUTED ** A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a "signal SIGTERM" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning.

CVSS3: 9.1
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу