Page 6 of 33 results (0.020 seconds)

CVSS: 4.0EPSS: 1%CPEs: 85EXPL: 0

OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service. • http://openvpn.net/man.html http://www.osvdb.org/25660 http://www.securityfocus.com/archive/1/432863/100/0/threaded http://www.securityfocus.com/archive/1/432867/100/0/threaded http://www.securityfocus.com/archive/1/433000/100/0/threaded •

CVSS: 9.0EPSS: 0%CPEs: 6EXPL: 0

OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable. • http://openvpn.net/changelog.html http://secunia.com/advisories/19531 http://secunia.com/advisories/19598 http://secunia.com/advisories/19837 http://secunia.com/advisories/19897 http://sourceforge.net/mailarchive/forum.php?thread_id=10093825&forum_id=8482 http://www.debian.org/security/2006/dsa-1045 http://www.mandriva.com/security/advisories?name=MDKSA-2006:069 http://www.novell.com/linux/security/advisories/2006_04_28.html http://www.osreviews.net/reviews/security/openvpn-print& •

CVSS: 5.0EPSS: 5%CPEs: 78EXPL: 0

OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler. • http://openvpn.net/changelog.html http://secunia.com/advisories/17376 http://secunia.com/advisories/17447 http://secunia.com/advisories/17452 http://secunia.com/advisories/17480 http://www.debian.org/security/2005/dsa-885 http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml http://www.novell.com/linux/security/advisories/2005_25_sr.html http://www.osvdb.org/20416 http://www.securityfocus.com/archive/1/415487 http://www.securityfocus.com/bid/15270 •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 0

Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option. • http://marc.info/?l=bugtraq&m=113081023121059&w=2 http://openvpn.net/changelog.html http://secunia.com/advisories/17376 http://secunia.com/advisories/17447 http://secunia.com/advisories/17452 http://secunia.com/advisories/17480 http://www.debian.org/security/2005/dsa-885 http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml http://www.novell.com/linux/security/advisories/2005_25_sr.html http://www.securityfocus.com/archive/1/415487 http://www.securityfocus.c •

CVSS: 5.0EPSS: 2%CPEs: 74EXPL: 0

OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts. • http://openvpn.net/changelog.html http://secunia.com/advisories/16463 http://secunia.com/advisories/17103 http://www.debian.org/security/2005/dsa-851 http://www.mandriva.com/security/advisories?name=MDKSA-2005:145 http://www.novell.com/linux/security/advisories/2005_20_sr.html http://www.securityfocus.com/bid/14605 •