Lucene search

K
cve[email protected]CVE-2005-2533
HistoryAug 24, 2005 - 4:00 a.m.

CVE-2005-2533

2005-08-2404:00:00
web.nvd.nist.gov
26
openvpn
vulnerability
dos
memory exhaustion
nvd
cve-2005-2533

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

AI Score

5.9

Confidence

Low

EPSS

0.003

Percentile

68.1%

OpenVPN before 2.0.1, when running in β€œdev tap” Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses.

Affected configurations

NVD
Node
openvpnopenvpnMatch2.0
OR
openvpnopenvpnMatch2.0.1_rc1
OR
openvpnopenvpnMatch2.0.1_rc2
OR
openvpnopenvpnMatch2.0.1_rc3
OR
openvpnopenvpnMatch2.0.1_rc4
OR
openvpnopenvpnMatch2.0.1_rc5
OR
openvpnopenvpnMatch2.0.1_rc6
OR
openvpnopenvpnMatch2.0.1_rc7
OR
openvpnopenvpnMatch2.0_beta1
OR
openvpnopenvpnMatch2.0_beta2
OR
openvpnopenvpnMatch2.0_beta3
OR
openvpnopenvpnMatch2.0_beta4
OR
openvpnopenvpnMatch2.0_beta5
OR
openvpnopenvpnMatch2.0_beta6
OR
openvpnopenvpnMatch2.0_beta7
OR
openvpnopenvpnMatch2.0_beta8
OR
openvpnopenvpnMatch2.0_beta9
OR
openvpnopenvpnMatch2.0_beta10
OR
openvpnopenvpnMatch2.0_beta11
OR
openvpnopenvpnMatch2.0_beta12
OR
openvpnopenvpnMatch2.0_beta13
OR
openvpnopenvpnMatch2.0_beta15
OR
openvpnopenvpnMatch2.0_beta16
OR
openvpnopenvpnMatch2.0_beta17
OR
openvpnopenvpnMatch2.0_beta18
OR
openvpnopenvpnMatch2.0_beta19
OR
openvpnopenvpnMatch2.0_beta20
OR
openvpnopenvpnMatch2.0_beta28
OR
openvpnopenvpnMatch2.0_rc1
OR
openvpnopenvpnMatch2.0_rc2
OR
openvpnopenvpnMatch2.0_rc3
OR
openvpnopenvpnMatch2.0_rc4
OR
openvpnopenvpnMatch2.0_rc5
OR
openvpnopenvpnMatch2.0_rc6
OR
openvpnopenvpnMatch2.0_rc7
OR
openvpnopenvpnMatch2.0_rc8
OR
openvpnopenvpnMatch2.0_rc9
OR
openvpnopenvpnMatch2.0_rc10
OR
openvpnopenvpnMatch2.0_rc11
OR
openvpnopenvpnMatch2.0_rc12
OR
openvpnopenvpnMatch2.0_rc13
OR
openvpnopenvpnMatch2.0_rc14
OR
openvpnopenvpnMatch2.0_rc15
OR
openvpnopenvpnMatch2.0_rc16
OR
openvpnopenvpnMatch2.0_rc17
OR
openvpnopenvpnMatch2.0_rc18
OR
openvpnopenvpnMatch2.0_rc19
OR
openvpnopenvpnMatch2.0_rc20
OR
openvpnopenvpnMatch2.0_rc21
OR
openvpnopenvpnMatch2.0_test1
OR
openvpnopenvpnMatch2.0_test2
OR
openvpnopenvpnMatch2.0_test3
OR
openvpnopenvpnMatch2.0_test5
OR
openvpnopenvpnMatch2.0_test6
OR
openvpnopenvpnMatch2.0_test7
OR
openvpnopenvpnMatch2.0_test8
OR
openvpnopenvpnMatch2.0_test9
OR
openvpnopenvpnMatch2.0_test10
OR
openvpnopenvpnMatch2.0_test11
OR
openvpnopenvpnMatch2.0_test12
OR
openvpnopenvpnMatch2.0_test14
OR
openvpnopenvpnMatch2.0_test15
OR
openvpnopenvpnMatch2.0_test16
OR
openvpnopenvpnMatch2.0_test17
OR
openvpnopenvpnMatch2.0_test18
OR
openvpnopenvpnMatch2.0_test19
OR
openvpnopenvpnMatch2.0_test20
OR
openvpnopenvpnMatch2.0_test21
OR
openvpnopenvpnMatch2.0_test22
OR
openvpnopenvpnMatch2.0_test23
OR
openvpnopenvpnMatch2.0_test24
OR
openvpnopenvpnMatch2.0_test26
OR
openvpnopenvpnMatch2.0_test27
OR
openvpnopenvpnMatch2.0_test29
VendorProductVersionCPE
openvpnopenvpn2.0+rc18cpe:/a:openvpn:openvpn:2.0+rc18:::
openvpnopenvpn2.0+test11cpe:/a:openvpn:openvpn:2.0+test11:::
openvpnopenvpn2.0.1+rc7cpe:/a:openvpn:openvpn:2.0.1+rc7:::
openvpnopenvpn2.0+beta2cpe:/a:openvpn:openvpn:2.0+beta2:::
openvpnopenvpn2.0+rc2cpe:/a:openvpn:openvpn:2.0+rc2:::
openvpnopenvpn2.0+test5cpe:/a:openvpn:openvpn:2.0+test5:::
openvpnopenvpn2.0+beta13cpe:/a:openvpn:openvpn:2.0+beta13:::
openvpnopenvpn2.0+test10cpe:/a:openvpn:openvpn:2.0+test10:::
openvpnopenvpn2.0+beta12cpe:/a:openvpn:openvpn:2.0+beta12:::
openvpnopenvpn2.0+beta10cpe:/a:openvpn:openvpn:2.0+beta10:::
Rows per page:
1-10 of 741

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

AI Score

5.9

Confidence

Low

EPSS

0.003

Percentile

68.1%