Summary
Detail | |||
---|---|---|---|
Vendor | Infradead | First view | 2010-10-14 |
Product | Openconnect | Last view | 2020-05-12 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2020-05-12 | CVE-2020-12823 | OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c. |
5.9 | 2020-04-23 | CVE-2020-12105 | OpenConnect through 8.08 mishandles negative return values from X509_check_ function calls, which might assist attackers in performing man-in-the-middle attacks. |
9.8 | 2020-02-13 | CVE-2013-7098 | OpenConnect VPN client with GnuTLS before 5.02 contains a heap overflow if MTU is increased on reconnection. |
9.8 | 2019-09-17 | CVE-2019-16239 | process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes. |
5 | 2013-02-24 | CVE-2012-6128 | Multiple stack-based buffer overflows in http.c in OpenConnect before 4.08 allow remote VPN gateways to cause a denial of service (application crash) via a long (1) hostname, (2) path, or (3) cookie list in a response. |
7.8 | 2012-06-07 | CVE-2012-3291 | Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner. |
5 | 2010-10-14 | CVE-2010-3903 | Unspecified vulnerability in OpenConnect before 2.23 allows remote AnyConnect SSL VPN servers to cause a denial of service (application crash) via a 404 HTTP status code. |
5 | 2010-10-14 | CVE-2010-3902 | OpenConnect before 2.26 places the webvpn cookie value in the debugging output, which might allow remote attackers to obtain sensitive information by reading this output, as demonstrated by output posted to the public openconnect-devel mailing list. |
6.4 | 2010-10-14 | CVE-2010-3901 | OpenConnect before 2.25 does not properly validate X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary AnyConnect SSL VPN servers via a crafted server certificate that (1) does not correspond to the server hostname or (2) is presented in circumstances involving a missing --cafile configuration option. |
5 | 2010-10-14 | CVE-2009-5009 | Double free vulnerability in OpenConnect before 1.40 might allow remote AnyConnect SSL VPN servers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted DTLS Cipher option during a reconnect operation. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
22% (2) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
22% (2) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
11% (1) | CWE-787 | Out-of-bounds Write |
11% (1) | CWE-755 | Improper Handling of Exceptional Conditions |
11% (1) | CWE-399 | Resource Management Errors |
11% (1) | CWE-200 | Information Exposure |
11% (1) | CWE-20 | Improper Input Validation |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:18176 | DSA-2495-1 openconnect - buffer overflow |
oval:org.mitre.oval:def:17242 | openconnect vulnerability |
oval:org.mitre.oval:def:18546 | DSA-2623-1 openconnect - buffer overflow |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
68632 | OpenConnect AnyConnect SSL VPN Server Crafted DTLS Cipher Double-free Remote DoS |
68627 | OpenConnect Debug Output webvpn Cookie Value Remote Information Disclosure |
68626 | OpenConnect AnyConnect SSL VPN Server 404 HTTP Status Code Remote DoS |
66781 | OpenConnect SSL Connection Hostname Verification MiTM Weakness Restriction By... |
OpenVAS Exploits
id | Description |
---|---|
2012-08-10 | Name : Debian Security Advisory DSA 2495-1 (openconnect) File : nvt/deb_2495_1.nasl |
2012-05-08 | Name : Fedora Update for openconnect FEDORA-2012-6758 File : nvt/gb_fedora_2012_6758_openconnect_fc16.nasl |
2010-12-09 | Name : Fedora Update for openconnect FEDORA-2010-18032 File : nvt/gb_fedora_2010_18032_openconnect_fc12.nasl |
2010-12-09 | Name : Fedora Update for openconnect FEDORA-2010-18053 File : nvt/gb_fedora_2010_18053_openconnect_fc13.nasl |
2010-12-09 | Name : Fedora Update for openconnect FEDORA-2010-18055 File : nvt/gb_fedora_2010_18055_openconnect_fc14.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2014-06-13 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2013-429.nasl - Type: ACT_GATHER_INFO |
2014-06-13 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2013-529.nasl - Type: ACT_GATHER_INFO |
2014-05-19 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201405-18.nasl - Type: ACT_GATHER_INFO |
2013-04-20 | Name: The remote Mandriva Linux host is missing one or more security updates. File: mandriva_MDVSA-2013-108.nasl - Type: ACT_GATHER_INFO |
2013-02-25 | Name: The remote Fedora host is missing a security update. File: fedora_2013-2472.nasl - Type: ACT_GATHER_INFO |
2013-02-25 | Name: The remote Fedora host is missing a security update. File: fedora_2013-2498.nasl - Type: ACT_GATHER_INFO |
2013-02-15 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-2623.nasl - Type: ACT_GATHER_INFO |
2012-06-29 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-2495.nasl - Type: ACT_GATHER_INFO |
2012-05-07 | Name: The remote Fedora host is missing a security update. File: fedora_2012-6758.nasl - Type: ACT_GATHER_INFO |
2010-11-30 | Name: The remote Fedora host is missing a security update. File: fedora_2010-18032.nasl - Type: ACT_GATHER_INFO |
2010-11-30 | Name: The remote Fedora host is missing a security update. File: fedora_2010-18053.nasl - Type: ACT_GATHER_INFO |
2010-11-30 | Name: The remote Fedora host is missing a security update. File: fedora_2010-18055.nasl - Type: ACT_GATHER_INFO |