Openvpn

Openvpn

38 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.16%
  • Published 03.04.2025 16:15:32
  • Last modified 29.04.2025 19:45:07

OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges

  • EPSS 0.16%
  • Published 02.04.2025 21:15:32
  • Last modified 24.05.2025 01:38:01

OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase

  • EPSS 0.28%
  • Published 06.01.2025 14:15:08
  • Last modified 10.06.2025 16:26:11

OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.

  • EPSS 0.25%
  • Published 08.07.2024 22:15:02
  • Last modified 10.06.2025 16:26:09

OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session

  • EPSS 6.99%
  • Published 08.07.2024 11:15:10
  • Last modified 21.11.2024 09:05:23

OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service.

  • EPSS 5.42%
  • Published 08.07.2024 11:15:10
  • Last modified 21.11.2024 09:04:39

The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.

  • EPSS 9.71%
  • Published 08.07.2024 11:15:10
  • Last modified 21.11.2024 09:00:04

The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.

  • EPSS 0.03%
  • Published 21.02.2024 11:15:07
  • Last modified 06.05.2025 18:02:59

The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbit...

  • EPSS 2.16%
  • Published 11.11.2023 01:15:07
  • Last modified 21.11.2024 08:29:25

Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.

  • EPSS 0.31%
  • Published 11.11.2023 01:15:07
  • Last modified 11.06.2025 15:15:26

Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.