Executive Summary
Summary | |
---|---|
Title | New OpenVPN packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-885 | First vendor Publication | 2005-11-07 |
Vendor | Debian | Last vendor Modification | 2005-11-07 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several vulnerabilities have been discovered in OpenVPN, a free virtual private network daemon. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-3393 A format string vulnerability has been discovered that could allow arbitrary code to be executed on the client. CVE-2005-3409 A NULL pointer dereferencing has been discovered that could be exploited to crash the service. The old stable distribution (woody) does not contain openvpn packages. For the stable distribution (sarge) these problems have been fixed in version 2.0-1sarge2. For the unstable distribution (sid) these problems have been fixed in version 2.0.5-1. We recommend that you upgrade your openvpn package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-885 |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200511-07 (OpenVPN) File : nvt/glsa_200511_07.nasl |
2008-09-04 | Name : FreeBSD Ports: openvpn File : nvt/freebsd_openvpn3.nasl |
2008-09-04 | Name : FreeBSD Ports: openvpn File : nvt/freebsd_openvpn4.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 885-1 (openvpn) File : nvt/deb_885_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
20416 | OpenVPN TCP Mode accept() Function Failure NULL Dereference DoS OpenVPN contains a flaw that may allow a remote denial of service. The issue is triggered when handling specially crafted TCP packets, and will result in loss of availability for the service by a NULL dereference (coredump) in the openVPN daemon. |
20415 | OpenVPN Client foreign_option() Function Format String OpenVPN Client contains a flaw that may allow a malicious server to perform a format string attack. The issue is triggered when using a specific value in the 'dhcp-option' parameter on a server. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-885.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_3de493310dec422c93e5e4719e9869c5.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_6129fdc76462456da3ef8fc3fbf44d16.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2005-206.nasl - Type : ACT_GATHER_INFO |
2005-11-07 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200511-07.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:36 |
|