Lucene search

K
freebsdFreeBSD6129FDC7-6462-456D-A3EF-8FC3FBF44D16
HistoryOct 31, 2005 - 12:00 a.m.

openvpn -- arbitrary code execution on client through malicious or compromised server

2005-10-3100:00:00
vuxml.freebsd.org
16

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.024 Low

EPSS

Percentile

90.1%

James Yonan reports:

A format string vulnerability
in the foreign_option function in options.c could
potentially allow a malicious or compromised server
to execute arbitrary code on the client. Only
non-Windows clients are affected. The vulnerability
only exists if (a) the client’s TLS negotiation with
the server succeeds, (b) the server is malicious or
has been compromised such that it is configured to
push a maliciously crafted options string to the client,
and © the client indicates its willingness to accept
pushed options from the server by having “pull” or
“client” in its configuration file (Credit: Vade79).

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchopenvpn= 2.0UNKNOWN
FreeBSDanynoarchopenvpn< 2.0.4UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.024 Low

EPSS

Percentile

90.1%