CVE-2014-8104
- EPSS 2.04%
- Veröffentlicht 03.12.2014 18:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
CVE-2014-5455
- EPSS 0.64%
- Veröffentlicht 25.08.2014 16:55:04
- Zuletzt bearbeitet 12.04.2025 10:46:40
Unquoted Windows search path vulnerability in the ptservice service prior to PrivateTunnel version 3.0 (Windows) and OpenVPN Connect version 3.1 (Windows) allows local users to gain privileges via a crafted program.exe file in the %SYSTEMDRIVE% folde...
CVE-2013-2061
- EPSS 1.45%
- Veröffentlicht 18.11.2013 02:55:07
- Zuletzt bearbeitet 11.04.2025 00:51:21
The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and ...
CVE-2008-3459
- EPSS 0.59%
- Veröffentlicht 04.08.2008 19:41:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metac...
- EPSS 0.91%
- Veröffentlicht 05.05.2006 19:02:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or ca...
- EPSS 3.56%
- Veröffentlicht 06.04.2006 22:04:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
- EPSS 2.51%
- Veröffentlicht 02.11.2005 00:02:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.
CVE-2005-3393
- EPSS 1.62%
- Veröffentlicht 01.11.2005 12:47:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option.
- EPSS 1.41%
- Veröffentlicht 24.08.2005 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, wh...
CVE-2005-2534
- EPSS 0.61%
- Veröffentlicht 24.08.2005 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate.