CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
Low
EPSS
Percentile
94.7%
OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.
Vendor | Product | Version | CPE |
---|---|---|---|
openvpn | openvpn | 2.0 | cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:* |
openvpn | openvpn | 2.0.1_rc1 | cpe:2.3:a:openvpn:openvpn:2.0.1_rc1:*:*:*:*:*:*:* |
openvpn | openvpn | 2.0.1_rc2 | cpe:2.3:a:openvpn:openvpn:2.0.1_rc2:*:*:*:*:*:*:* |
openvpn | openvpn | 2.0.1_rc3 | cpe:2.3:a:openvpn:openvpn:2.0.1_rc3:*:*:*:*:*:*:* |
openvpn | openvpn | 2.0.1_rc4 | cpe:2.3:a:openvpn:openvpn:2.0.1_rc4:*:*:*:*:*:*:* |
openvpn | openvpn | 2.0.1_rc5 | cpe:2.3:a:openvpn:openvpn:2.0.1_rc5:*:*:*:*:*:*:* |
openvpn | openvpn | 2.0.1_rc6 | cpe:2.3:a:openvpn:openvpn:2.0.1_rc6:*:*:*:*:*:*:* |
openvpn | openvpn | 2.0.1_rc7 | cpe:2.3:a:openvpn:openvpn:2.0.1_rc7:*:*:*:*:*:*:* |
openvpn | openvpn | 2.0.2_rc1 | cpe:2.3:a:openvpn:openvpn:2.0.2_rc1:*:*:*:*:*:*:* |
openvpn | openvpn | 2.0.3_rc1 | cpe:2.3:a:openvpn:openvpn:2.0.3_rc1:*:*:*:*:*:*:* |
openvpn.net/changelog.html
secunia.com/advisories/17376
secunia.com/advisories/17447
secunia.com/advisories/17452
secunia.com/advisories/17480
www.debian.org/security/2005/dsa-885
www.gentoo.org/security/en/glsa/glsa-200511-07.xml
www.novell.com/linux/security/advisories/2005_25_sr.html
www.osvdb.org/20416
www.securityfocus.com/archive/1/415487
www.securityfocus.com/bid/15270