Description
OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-885-1 | New OpenVPN packages fix several vulnerabilities |
EUVD |
EUVD-2005-3408 | OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T23:10:08.881Z
Reserved: 2005-11-01T00:00:00.000Z
Link: CVE-2005-3409
No data.
Status : Modified
Published: 2005-11-02T00:02:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2005-3409
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD