CVE-2006-2229
https://notcve.org/view.php?id=CVE-2006-2229
OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service. • http://openvpn.net/man.html http://www.osvdb.org/25660 http://www.securityfocus.com/archive/1/432863/100/0/threaded http://www.securityfocus.com/archive/1/432867/100/0/threaded http://www.securityfocus.com/archive/1/433000/100/0/threaded •
CVE-2006-1629
https://notcve.org/view.php?id=CVE-2006-1629
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable. • http://openvpn.net/changelog.html http://secunia.com/advisories/19531 http://secunia.com/advisories/19598 http://secunia.com/advisories/19837 http://secunia.com/advisories/19897 http://sourceforge.net/mailarchive/forum.php?thread_id=10093825&forum_id=8482 http://www.debian.org/security/2006/dsa-1045 http://www.mandriva.com/security/advisories?name=MDKSA-2006:069 http://www.novell.com/linux/security/advisories/2006_04_28.html http://www.osreviews.net/reviews/security/openvpn-print& •
CVE-2005-3409
https://notcve.org/view.php?id=CVE-2005-3409
OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler. • http://openvpn.net/changelog.html http://secunia.com/advisories/17376 http://secunia.com/advisories/17447 http://secunia.com/advisories/17452 http://secunia.com/advisories/17480 http://www.debian.org/security/2005/dsa-885 http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml http://www.novell.com/linux/security/advisories/2005_25_sr.html http://www.osvdb.org/20416 http://www.securityfocus.com/archive/1/415487 http://www.securityfocus.com/bid/15270 •
CVE-2005-3393
https://notcve.org/view.php?id=CVE-2005-3393
Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option. • http://marc.info/?l=bugtraq&m=113081023121059&w=2 http://openvpn.net/changelog.html http://secunia.com/advisories/17376 http://secunia.com/advisories/17447 http://secunia.com/advisories/17452 http://secunia.com/advisories/17480 http://www.debian.org/security/2005/dsa-885 http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml http://www.novell.com/linux/security/advisories/2005_25_sr.html http://www.securityfocus.com/archive/1/415487 http://www.securityfocus.c •