Filtered by vendor Openvpn
Subscribe
Total
51 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2013-2061 | 2 Opensuse, Openvpn | 3 Opensuse, Openvpn, Openvpn Access Server | 2024-11-21 | 2.6 LOW | N/A |
The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher. | |||||
CVE-2008-3459 | 1 Openvpn | 1 Openvpn | 2024-11-21 | 7.6 HIGH | N/A |
Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters. | |||||
CVE-2006-2229 | 1 Openvpn | 2 Openvpn, Openvpn Access Server | 2024-11-21 | 4.0 MEDIUM | N/A |
OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service. | |||||
CVE-2006-1629 | 1 Openvpn | 2 Openvpn, Openvpn Access Server | 2024-11-21 | 9.0 HIGH | N/A |
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable. | |||||
CVE-2005-3409 | 1 Openvpn | 2 Openvpn, Openvpn Access Server | 2024-11-21 | 5.0 MEDIUM | N/A |
OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler. | |||||
CVE-2005-3393 | 1 Openvpn | 2 Openvpn, Openvpn Access Server | 2024-11-21 | 7.5 HIGH | N/A |
Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option. | |||||
CVE-2005-2534 | 1 Openvpn | 1 Openvpn | 2024-11-20 | 2.6 LOW | N/A |
Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate. | |||||
CVE-2005-2533 | 1 Openvpn | 1 Openvpn | 2024-11-20 | 2.1 LOW | N/A |
OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses. | |||||
CVE-2005-2532 | 1 Openvpn | 1 Openvpn | 2024-11-20 | 5.0 MEDIUM | N/A |
OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted. | |||||
CVE-2005-2531 | 1 Openvpn | 1 Openvpn | 2024-11-20 | 5.0 MEDIUM | N/A |
OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts. | |||||
CVE-2020-20813 | 1 Openvpn | 1 Openvpn | 2024-10-07 | N/A | 7.5 HIGH |
Control Channel in OpenVPN 2.4.7 and earlier allows remote attackers to cause a denial of service via crafted reset packet. | |||||
CVE-2023-7224 | 1 Openvpn | 1 Connect | 2024-09-04 | N/A | 7.8 HIGH |
OpenVPN Connect version 3.0 through 3.4.6 on macOS allows local users to execute code in external third party libraries using the DYLD_INSERT_LIBRARIES environment variable | |||||
CVE-2024-27459 | 1 Openvpn | 1 Openvpn | 2024-08-23 | N/A | 7.8 HIGH |
The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges. | |||||
CVE-2024-24974 | 1 Openvpn | 1 Openvpn | 2024-08-01 | N/A | 7.5 HIGH |
The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service. | |||||
CVE-2024-27903 | 1 Openvpn | 1 Openvpn | 2024-07-11 | N/A | 9.8 CRITICAL |
OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service. | |||||
CVE-2023-46849 | 3 Debian, Fedoraproject, Openvpn | 4 Debian Linux, Fedora, Openvpn and 1 more | 2024-02-28 | N/A | 7.5 HIGH |
Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service. | |||||
CVE-2023-46850 | 3 Debian, Fedoraproject, Openvpn | 4 Debian Linux, Fedora, Openvpn and 1 more | 2024-02-28 | N/A | 9.8 CRITICAL |
Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer. | |||||
CVE-2022-3761 | 1 Openvpn | 1 Connect | 2024-02-28 | N/A | 5.9 MEDIUM |
OpenVPN Connect versions before 3.4.0.4506 (macOS) and OpenVPN Connect before 3.4.0.3100 (Windows) allows man-in-the-middle attackers to intercept configuration profile download requests which contains the users credentials | |||||
CVE-2021-4234 | 1 Openvpn | 1 Openvpn Access Server | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
OpenVPN Access Server 2.10 and prior versions are susceptible to resending multiple packets in a response to a reset packet sent from the client which the client again does not respond to, resulting in a limited amplification attack. | |||||
CVE-2022-33737 | 1 Openvpn | 1 Openvpn Access Server | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
The OpenVPN Access Server installer creates a log file readable for everyone, which from version 2.10.0 and before 2.11.0 may contain a random generated admin password |