Lucene search

K
freebsdFreeBSDBE4CCB7B-C48B-11DA-AE12-0002B3B60E4C
HistoryApr 03, 2006 - 12:00 a.m.

openvpn -- LD_PRELOAD code execution on client through malicious or compromised server

2006-04-0300:00:00
vuxml.freebsd.org
7

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

EPSS

0.006

Percentile

78.8%

Hendrik Weimer reports:

OpenVPN clients are a bit too generous when accepting
configuration options from a server. It is possible to transmit
environment variables to client-side shell scripts. There are some
filters in place to prevent obvious nonsense, however they don’t
catch the good old LD_PRELOAD trick. All we need is to put a file
onto the client under a known location (e.g. by returning a
specially crafted document upon web access) and we have a remote
root exploit. But since the attack may only come from authenticated
servers, this threat is greatly reduced.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchopenvpn= 2.0UNKNOWN
FreeBSDanynoarchopenvpn< 2.0.6UNKNOWN

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

EPSS

0.006

Percentile

78.8%