summaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2005-11-01 22:49:20 +0000
committersimon <simon@FreeBSD.org>2005-11-01 22:49:20 +0000
commit1bce21f821d0ca6de9bd8f99d0653b493ebfc201 (patch)
tree62b55324c6fa523c9b67b8329f70adbdd5c6d453 /security
parent6855f13ff66e4a82d08cf9f45dc7f9a4c90d19d8 (diff)
downloadFreeBSD-ports-1bce21f821d0ca6de9bd8f99d0653b493ebfc201.zip
FreeBSD-ports-1bce21f821d0ca6de9bd8f99d0653b493ebfc201.tar.gz
Document two OpenVPN vulnerabilities.
Submitted by: Matthias Andree <matthias.andree@gmx.de>
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml67
1 files changed, 67 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 3261767..1aa391f 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,73 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="3de49331-0dec-422c-93e5-e4719e9869c5">
+ <topic>openvpn -- potential denial-of-service on servers in TCP mode</topic>
+ <affects>
+ <package>
+ <name>openvpn</name>
+ <range><gt>2.0</gt><lt>2.0.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>James Yonan reports:</p>
+ <blockquote cite="http://openvpn.net/changelog.html">
+ <p>If the TCP server accept() call returns an error status, the
+ resulting exception handler may attempt to indirect through a NULL
+ pointer, causing a segfault. Affects all OpenVPN 2.0 versions.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2005-3409</cvename>
+ <url>http://openvpn.net/changelog.html</url>
+ </references>
+ <dates>
+ <discovery>2005-11-01</discovery>
+ <entry>2005-11-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="6129fdc7-6462-456d-a3ef-8fc3fbf44d16">
+ <topic>openvpn -- arbitrary code execution on client through
+ malicious or compromised server</topic>
+ <affects>
+ <package>
+ <name>openvpn</name>
+ <range><lt>2.0.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>James Yonan reports:</p>
+ <blockquote cite="http://openvpn.net/changelog.html">
+ <p>A format string vulnerability
+ in the foreign_option function in options.c could
+ potentially allow a malicious or compromised server
+ to execute arbitrary code on the client. Only
+ non-Windows clients are affected. The vulnerability
+ only exists if (a) the client's TLS negotiation with
+ the server succeeds, (b) the server is malicious or
+ has been compromised such that it is configured to
+ push a maliciously crafted options string to the client,
+ and (c) the client indicates its willingness to accept
+ pushed options from the server by having "pull" or
+ "client" in its configuration file (Credit: Vade79).</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2005-3393</cvename>
+ <mlist>http://www.securityfocus.com/archive/1/415293/30/0/threaded</mlist>
+ <url>http://openvpn.net/changelog.html</url>
+ </references>
+ <dates>
+ <discovery>2005-10-31</discovery>
+ <entry>2005-11-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="6821a2db-4ab7-11da-932d-00055d790c25">
<topic>PHP -- multiple vulnerabilities</topic>
<affects>
OpenPOWER on IntegriCloud