Vulnerabilites related to OpenVPN - Access Server
cve-2023-46850
Vulnerability from cvelistv5
Published
2023-11-11 00:15
Modified
2025-02-13 17:14
Severity ?
Summary
Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T20:53:21.910Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://community.openvpn.net/openvpn/wiki/CVE-2023-46850",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5555",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-46850",
                        options: [
                           {
                              Exploitation: "None",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "Total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-08T21:43:36.505056Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-08T21:44:02.391Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "OpenVPN 2 (Community)",
               vendor: "OpenVPN",
               versions: [
                  {
                     lessThanOrEqual: "2.6.6",
                     status: "affected",
                     version: "2.6.0",
                     versionType: "minor release",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               platforms: [
                  "Linux",
               ],
               product: "Access Server",
               vendor: "OpenVPN",
               versions: [
                  {
                     lessThanOrEqual: "2.11.3",
                     status: "affected",
                     version: "2.11.0",
                     versionType: "patch release",
                  },
                  {
                     lessThanOrEqual: "2.12.2",
                     status: "affected",
                     version: "2.12.0",
                     versionType: "patch release",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-416",
                     description: "CWE-416 Use After Free",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-29T02:06:20.991Z",
            orgId: "36a55730-e66d-4d39-8ca6-3c3b3017965e",
            shortName: "OpenVPN",
         },
         references: [
            {
               url: "https://community.openvpn.net/openvpn/wiki/CVE-2023-46850",
            },
            {
               url: "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/",
            },
            {
               url: "https://www.debian.org/security/2023/dsa-5555",
            },
            {
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/",
            },
            {
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "36a55730-e66d-4d39-8ca6-3c3b3017965e",
      assignerShortName: "OpenVPN",
      cveId: "CVE-2023-46850",
      datePublished: "2023-11-11T00:15:07.076Z",
      dateReserved: "2023-10-27T13:38:49.496Z",
      dateUpdated: "2025-02-13T17:14:45.269Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-46849
Vulnerability from cvelistv5
Published
2023-11-11 00:05
Modified
2025-02-13 17:14
Severity ?
Summary
Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T20:53:21.915Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://community.openvpn.net/openvpn/wiki/CVE-2023-46849",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5555",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "OpenVPN 2 (Community)",
               vendor: "OpenVPN",
               versions: [
                  {
                     lessThanOrEqual: "2.6.6",
                     status: "affected",
                     version: "2.6.0",
                     versionType: "minor release",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               platforms: [
                  "Linux",
               ],
               product: "Access Server",
               vendor: "OpenVPN",
               versions: [
                  {
                     lessThanOrEqual: "2.11.3",
                     status: "affected",
                     version: "2.11.0",
                     versionType: "patch release",
                  },
                  {
                     lessThanOrEqual: "2.12.1",
                     status: "affected",
                     version: "2.12.0",
                     versionType: "patch release",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-369",
                     description: "CWE-369 Divide By Zero",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-29T02:06:19.217Z",
            orgId: "36a55730-e66d-4d39-8ca6-3c3b3017965e",
            shortName: "OpenVPN",
         },
         references: [
            {
               url: "https://community.openvpn.net/openvpn/wiki/CVE-2023-46849",
            },
            {
               url: "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/",
            },
            {
               url: "https://www.debian.org/security/2023/dsa-5555",
            },
            {
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/",
            },
            {
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "36a55730-e66d-4d39-8ca6-3c3b3017965e",
      assignerShortName: "OpenVPN",
      cveId: "CVE-2023-46849",
      datePublished: "2023-11-11T00:05:13.487Z",
      dateReserved: "2023-10-27T13:38:49.496Z",
      dateUpdated: "2025-02-13T17:14:44.708Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

var-200605-0584
Vulnerability from variot

OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service. OpenVPN is prone to a denial-of-service vulnerability

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200605-0584",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "openvpn",
            scope: "eq",
            trust: 1.9,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1.6,
            vendor: "openvpn",
            version: "2.0_beta5",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1.6,
            vendor: "openvpn",
            version: "2.0_beta18",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1.6,
            vendor: "openvpn",
            version: "2.0_beta3",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1.6,
            vendor: "openvpn",
            version: "2.0_beta4",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1.6,
            vendor: "openvpn",
            version: "2.0_beta6",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1.6,
            vendor: "openvpn",
            version: "2.0_beta20",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1.6,
            vendor: "openvpn",
            version: "2.0_beta28",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1.6,
            vendor: "openvpn",
            version: "2.0_beta7",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1.6,
            vendor: "openvpn",
            version: "2.0_beta2",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1.6,
            vendor: "openvpn",
            version: "2.0_beta19",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test10",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test25",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc13",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_beta12",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc7",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_beta16",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test26",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_beta15",
         },
         {
            model: "access server",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.5",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_beta8",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_beta13",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc20",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc11",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_beta11",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_beta1",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc4",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test22",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test2",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test4",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.2_rc1",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc1",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc8",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_beta17",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc15",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test14",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test17",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test20",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test15",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.1_rc6",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc6",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc3",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc21",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.6_rc1",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test21",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_beta10",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc19",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test11",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.1_rc7",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test6",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc5",
         },
         {
            model: "access server",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.2",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc17",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc2",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test5",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.1_rc1",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc14",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test27",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.3_rc1",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc10",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.1_rc5",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.1_rc2",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test19",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test1",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test29",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test18",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test3",
         },
         {
            model: "access server",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.6",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_beta9",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.1_rc4",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test9",
         },
         {
            model: "access server",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.1",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test12",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test23",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test24",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.4",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.1_rc3",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc18",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc12",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test7",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test16",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc9",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_rc16",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0_test8",
         },
         {
            model: "access server",
            scope: "eq",
            trust: 1,
            vendor: "openvpn",
            version: "2.0.7",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 0.9,
            vendor: "openvpn",
            version: "2.0.1",
         },
         {
            model: "2.0.1 rc1",
            scope: null,
            trust: 0.6,
            vendor: "openvpn",
            version: null,
         },
         {
            model: "2.0.1 rc2",
            scope: null,
            trust: 0.6,
            vendor: "openvpn",
            version: null,
         },
         {
            model: "2.0.1 rc3",
            scope: null,
            trust: 0.6,
            vendor: "openvpn",
            version: null,
         },
         {
            model: "2.0.1 rc4",
            scope: null,
            trust: 0.6,
            vendor: "openvpn",
            version: null,
         },
         {
            model: "2.0.1 rc5",
            scope: null,
            trust: 0.6,
            vendor: "openvpn",
            version: null,
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "3.1.3",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0.7",
         },
         {
            model: "rc5",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0.1",
         },
         {
            model: "rc4",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0.1",
         },
         {
            model: "rc3",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0.1",
         },
         {
            model: "rc2",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0.1",
         },
         {
            model: "rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0.1",
         },
         {
            model: "rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0.6",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0.6",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0.5",
         },
         {
            model: "rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0.3",
         },
         {
            model: "rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0.2",
         },
         {
            model: "openvpn",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0.2",
         },
         {
            model: "rc7",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0.1",
         },
         {
            model: "rc6",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0.1",
         },
         {
            model: "test9",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test8",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test7",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test6",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test5",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test4",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test3",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test29",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test27",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test26",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test25",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test24",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test23",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test22",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test21",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test20",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test2",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test19",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test18",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test17",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test16",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test15",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test14",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test12",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test11",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test10",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "test1",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc9",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc8",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc7",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc6",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc5",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc4",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc3",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc21",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc20",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc2",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc19",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc18",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc17",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc16",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc15",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc14",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc13",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc12",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc11",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc10",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta9",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta8",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta7",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta6",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta4",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta3",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta28",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta20",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta2",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta19",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta18",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta17",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta16",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta15",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta13",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta12",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta11",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta10",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
         {
            model: "beta1",
            scope: "eq",
            trust: 0.3,
            vendor: "openvpn",
            version: "2.0",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2006-2916",
         },
         {
            db: "BID",
            id: "87623",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200605-102",
         },
         {
            db: "NVD",
            id: "CVE-2006-2229",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Unknown",
      sources: [
         {
            db: "BID",
            id: "87623",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2006-2229",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "HIGH",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 4.9,
                  id: "CVE-2006-2229",
                  impactScore: 4.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1,
                  vectorString: "AV:N/AC:H/Au:N/C:P/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "HIGH",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 4.9,
                  id: "CNVD-2006-2916",
                  impactScore: 4.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:H/Au:N/C:P/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2006-2229",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2006-2916",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200605-102",
                  trust: 0.6,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2006-2916",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200605-102",
         },
         {
            db: "NVD",
            id: "CVE-2006-2229",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service. OpenVPN is prone to a denial-of-service vulnerability",
      sources: [
         {
            db: "NVD",
            id: "CVE-2006-2229",
         },
         {
            db: "CNVD",
            id: "CNVD-2006-2916",
         },
         {
            db: "BID",
            id: "87623",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2006-2229",
            trust: 2.5,
         },
         {
            db: "OSVDB",
            id: "25660",
            trust: 1.6,
         },
         {
            db: "CNVD",
            id: "CNVD-2006-2916",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200605-102",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "87623",
            trust: 0.3,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2006-2916",
         },
         {
            db: "BID",
            id: "87623",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200605-102",
         },
         {
            db: "NVD",
            id: "CVE-2006-2229",
         },
      ],
   },
   id: "VAR-200605-0584",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2006-2916",
         },
      ],
      trust: 1.35,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2006-2916",
         },
      ],
   },
   last_update_date: "2024-11-23T23:07:05.149000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2006-2229",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.9,
            url: "http://openvpn.net/man.html",
         },
         {
            trust: 1.6,
            url: "http://www.securityfocus.com/archive/1/432863/100/0/threaded",
         },
         {
            trust: 1.6,
            url: "http://www.osvdb.org/25660",
         },
         {
            trust: 1.6,
            url: "http://www.securityfocus.com/archive/1/432867/100/0/threaded",
         },
         {
            trust: 1.6,
            url: "http://www.securityfocus.com/archive/1/433000/100/0/threaded",
         },
         {
            trust: 0.9,
            url: "http://www.securityfocus.com/archive/1/archive/1/432863/100/0/threaded",
         },
         {
            trust: 0.3,
            url: "http://www.securityfocus.com/archive/1/archive/1/433000/100/0/threaded",
         },
         {
            trust: 0.3,
            url: "http://www.securityfocus.com/archive/1/archive/1/432867/100/0/threaded",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2006-2916",
         },
         {
            db: "BID",
            id: "87623",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200605-102",
         },
         {
            db: "NVD",
            id: "CVE-2006-2229",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2006-2916",
         },
         {
            db: "BID",
            id: "87623",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200605-102",
         },
         {
            db: "NVD",
            id: "CVE-2006-2229",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2006-05-05T00:00:00",
            db: "CNVD",
            id: "CNVD-2006-2916",
         },
         {
            date: "2006-05-05T00:00:00",
            db: "BID",
            id: "87623",
         },
         {
            date: "2006-05-05T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200605-102",
         },
         {
            date: "2006-05-05T19:02:00",
            db: "NVD",
            id: "CVE-2006-2229",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2006-05-05T00:00:00",
            db: "CNVD",
            id: "CNVD-2006-2916",
         },
         {
            date: "2006-05-05T00:00:00",
            db: "BID",
            id: "87623",
         },
         {
            date: "2020-05-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200605-102",
         },
         {
            date: "2024-11-21T00:10:50.520000",
            db: "NVD",
            id: "CVE-2006-2229",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200605-102",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenVPN management interface TCP session information disclosure vulnerability",
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2006-2916",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200605-102",
         },
      ],
      trust: 0.6,
   },
}