Логотип exploitDog
bind:"GHSA-6crj-vqv7-qq9r" OR bind:"CVE-2020-11810"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-6crj-vqv7-qq9r" OR bind:"CVE-2020-11810"

Количество 7

Количество 7

github логотип

GHSA-6crj-vqv7-qq9r

около 3 лет назад

An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.

CVSS3: 3.7
EPSS: Низкий
ubuntu логотип

CVE-2020-11810

около 5 лет назад

An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2020-11810

около 5 лет назад

An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.

CVSS3: 3.7
EPSS: Низкий
debian логотип

CVE-2020-11810

около 5 лет назад

An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can ...

CVSS3: 3.7
EPSS: Низкий
fstec логотип

BDU:2020-01777

около 5 лет назад

Уязвимость программного обеспечения OpenVPN, существущая из-за недостаточной проверки входных данных, позволяющая нарушителю перевести сеанс клиента на новый IP-адрес и вызвать отказ в обслуживании

CVSS3: 3.7
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0734-1

около 4 лет назад

Security update for openvpn

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1577-1

около 4 лет назад

Security update for openvpn

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-6crj-vqv7-qq9r

An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.

CVSS3: 3.7
2%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2020-11810

An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.

CVSS3: 3.7
2%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-11810

An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.

CVSS3: 3.7
2%
Низкий
около 5 лет назад
debian логотип
CVE-2020-11810

An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can ...

CVSS3: 3.7
2%
Низкий
около 5 лет назад
fstec логотип
BDU:2020-01777

Уязвимость программного обеспечения OpenVPN, существущая из-за недостаточной проверки входных данных, позволяющая нарушителю перевести сеанс клиента на новый IP-адрес и вызвать отказ в обслуживании

CVSS3: 3.7
около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0734-1

Security update for openvpn

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1577-1

Security update for openvpn

около 4 лет назад

Уязвимостей на страницу