This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Infradead First view 2010-10-14
Product Openconnect Last view 2020-05-12
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:infradead:openconnect:1.10:*:*:*:*:*:*:* 9
cpe:2.3:a:infradead:openconnect:1.30:*:*:*:*:*:*:* 9
cpe:2.3:a:infradead:openconnect:1.00:*:*:*:*:*:*:* 9
cpe:2.3:a:infradead:openconnect:1.20:*:*:*:*:*:*:* 9
cpe:2.3:a:infradead:openconnect:1.40:*:*:*:*:*:*:* 8
cpe:2.3:a:infradead:openconnect:*:*:*:*:*:*:*:* 8
cpe:2.3:a:infradead:openconnect:2.11:*:*:*:*:*:*:* 8
cpe:2.3:a:infradead:openconnect:2.21:*:*:*:*:*:*:* 8
cpe:2.3:a:infradead:openconnect:2.00:*:*:*:*:*:*:* 8
cpe:2.3:a:infradead:openconnect:2.01:*:*:*:*:*:*:* 8
cpe:2.3:a:infradead:openconnect:2.20:*:*:*:*:*:*:* 8
cpe:2.3:a:infradead:openconnect:2.10:*:*:*:*:*:*:* 8
cpe:2.3:a:infradead:openconnect:2.12:*:*:*:*:*:*:* 8
cpe:2.3:a:infradead:openconnect:2.22:*:*:*:*:*:*:* 8
cpe:2.3:a:infradead:openconnect:2.25:*:*:*:*:*:*:* 6
cpe:2.3:a:infradead:openconnect:2.23:*:*:*:*:*:*:* 6
cpe:2.3:a:infradead:openconnect:2.24:*:*:*:*:*:*:* 6
cpe:2.3:a:infradead:openconnect:3.13:*:*:*:*:*:*:* 5
cpe:2.3:a:infradead:openconnect:3.17:*:*:*:*:*:*:* 5
cpe:2.3:a:infradead:openconnect:3.02:*:*:*:*:*:*:* 5
cpe:2.3:a:infradead:openconnect:3.11:*:*:*:*:*:*:* 5
cpe:2.3:a:infradead:openconnect:3.00:*:*:*:*:*:*:* 5
cpe:2.3:a:infradead:openconnect:3.01:*:*:*:*:*:*:* 5
cpe:2.3:a:infradead:openconnect:3.16:*:*:*:*:*:*:* 5
cpe:2.3:a:infradead:openconnect:2.26:*:*:*:*:*:*:* 5
cpe:2.3:a:infradead:openconnect:3.14:*:*:*:*:*:*:* 5
cpe:2.3:a:infradead:openconnect:3.15:*:*:*:*:*:*:* 5
cpe:2.3:a:infradead:openconnect:3.12:*:*:*:*:*:*:* 5
cpe:2.3:a:infradead:openconnect:3.18:*:*:*:*:*:*:* 4
cpe:2.3:a:infradead:openconnect:4.03:*:*:*:*:*:*:* 4
cpe:2.3:a:infradead:openconnect:4.06:*:*:*:*:*:*:* 4
cpe:2.3:a:infradead:openconnect:3.99:*:*:*:*:*:*:* 4
cpe:2.3:a:infradead:openconnect:3.20:*:*:*:*:*:*:* 4
cpe:2.3:a:infradead:openconnect:4.05:*:*:*:*:*:*:* 4
cpe:2.3:a:infradead:openconnect:4.04:*:*:*:*:*:*:* 4
cpe:2.3:a:infradead:openconnect:3.19:*:*:*:*:*:*:* 4
cpe:2.3:a:infradead:openconnect:4.01:*:*:*:*:*:*:* 4
cpe:2.3:a:infradead:openconnect:4.00:*:*:*:*:*:*:* 4
cpe:2.3:a:infradead:openconnect:4.02:*:*:*:*:*:*:* 4
cpe:2.3:a:infradead:openconnect:8.09:*:*:*:*:*:*:* 1

Related : CVE

  Date Alert Description
9.8 2020-05-12 CVE-2020-12823

OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.

5.9 2020-04-23 CVE-2020-12105

OpenConnect through 8.08 mishandles negative return values from X509_check_ function calls, which might assist attackers in performing man-in-the-middle attacks.

9.8 2020-02-13 CVE-2013-7098

OpenConnect VPN client with GnuTLS before 5.02 contains a heap overflow if MTU is increased on reconnection.

9.8 2019-09-17 CVE-2019-16239

process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.

5 2013-02-24 CVE-2012-6128

Multiple stack-based buffer overflows in http.c in OpenConnect before 4.08 allow remote VPN gateways to cause a denial of service (application crash) via a long (1) hostname, (2) path, or (3) cookie list in a response.

7.8 2012-06-07 CVE-2012-3291

Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.

5 2010-10-14 CVE-2010-3903

Unspecified vulnerability in OpenConnect before 2.23 allows remote AnyConnect SSL VPN servers to cause a denial of service (application crash) via a 404 HTTP status code.

5 2010-10-14 CVE-2010-3902

OpenConnect before 2.26 places the webvpn cookie value in the debugging output, which might allow remote attackers to obtain sensitive information by reading this output, as demonstrated by output posted to the public openconnect-devel mailing list.

6.4 2010-10-14 CVE-2010-3901

OpenConnect before 2.25 does not properly validate X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary AnyConnect SSL VPN servers via a crafted server certificate that (1) does not correspond to the server hostname or (2) is presented in circumstances involving a missing --cafile configuration option.

5 2010-10-14 CVE-2009-5009

Double free vulnerability in OpenConnect before 1.40 might allow remote AnyConnect SSL VPN servers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted DTLS Cipher option during a reconnect operation.

CWE : Common Weakness Enumeration

%idName
22% (2) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
22% (2) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
11% (1) CWE-787 Out-of-bounds Write
11% (1) CWE-755 Improper Handling of Exceptional Conditions
11% (1) CWE-399 Resource Management Errors
11% (1) CWE-200 Information Exposure
11% (1) CWE-20 Improper Input Validation

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:18176 DSA-2495-1 openconnect - buffer overflow
oval:org.mitre.oval:def:17242 openconnect vulnerability
oval:org.mitre.oval:def:18546 DSA-2623-1 openconnect - buffer overflow

Open Source Vulnerability Database (OSVDB)

id Description
68632 OpenConnect AnyConnect SSL VPN Server Crafted DTLS Cipher Double-free Remote DoS
68627 OpenConnect Debug Output webvpn Cookie Value Remote Information Disclosure
68626 OpenConnect AnyConnect SSL VPN Server 404 HTTP Status Code Remote DoS
66781 OpenConnect SSL Connection Hostname Verification MiTM Weakness Restriction By...

OpenVAS Exploits

id Description
2012-08-10 Name : Debian Security Advisory DSA 2495-1 (openconnect)
File : nvt/deb_2495_1.nasl
2012-05-08 Name : Fedora Update for openconnect FEDORA-2012-6758
File : nvt/gb_fedora_2012_6758_openconnect_fc16.nasl
2010-12-09 Name : Fedora Update for openconnect FEDORA-2010-18032
File : nvt/gb_fedora_2010_18032_openconnect_fc12.nasl
2010-12-09 Name : Fedora Update for openconnect FEDORA-2010-18053
File : nvt/gb_fedora_2010_18053_openconnect_fc13.nasl
2010-12-09 Name : Fedora Update for openconnect FEDORA-2010-18055
File : nvt/gb_fedora_2010_18055_openconnect_fc14.nasl

Nessus® Vulnerability Scanner

id Description
2014-06-13 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2013-429.nasl - Type: ACT_GATHER_INFO
2014-06-13 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2013-529.nasl - Type: ACT_GATHER_INFO
2014-05-19 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201405-18.nasl - Type: ACT_GATHER_INFO
2013-04-20 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2013-108.nasl - Type: ACT_GATHER_INFO
2013-02-25 Name: The remote Fedora host is missing a security update.
File: fedora_2013-2472.nasl - Type: ACT_GATHER_INFO
2013-02-25 Name: The remote Fedora host is missing a security update.
File: fedora_2013-2498.nasl - Type: ACT_GATHER_INFO
2013-02-15 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-2623.nasl - Type: ACT_GATHER_INFO
2012-06-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-2495.nasl - Type: ACT_GATHER_INFO
2012-05-07 Name: The remote Fedora host is missing a security update.
File: fedora_2012-6758.nasl - Type: ACT_GATHER_INFO
2010-11-30 Name: The remote Fedora host is missing a security update.
File: fedora_2010-18032.nasl - Type: ACT_GATHER_INFO
2010-11-30 Name: The remote Fedora host is missing a security update.
File: fedora_2010-18053.nasl - Type: ACT_GATHER_INFO
2010-11-30 Name: The remote Fedora host is missing a security update.
File: fedora_2010-18055.nasl - Type: ACT_GATHER_INFO