Vulnerabilites related to OpenVPN - OpenVPN 2 (Community)
cve-2023-46850
Vulnerability from cvelistv5
Published
2023-11-11 00:15
Modified
2025-02-13 17:14
Severity ?
Summary
Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T20:53:21.910Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://community.openvpn.net/openvpn/wiki/CVE-2023-46850",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5555",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-46850",
                        options: [
                           {
                              Exploitation: "None",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "Total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-08T21:43:36.505056Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-08T21:44:02.391Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "OpenVPN 2 (Community)",
               vendor: "OpenVPN",
               versions: [
                  {
                     lessThanOrEqual: "2.6.6",
                     status: "affected",
                     version: "2.6.0",
                     versionType: "minor release",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               platforms: [
                  "Linux",
               ],
               product: "Access Server",
               vendor: "OpenVPN",
               versions: [
                  {
                     lessThanOrEqual: "2.11.3",
                     status: "affected",
                     version: "2.11.0",
                     versionType: "patch release",
                  },
                  {
                     lessThanOrEqual: "2.12.2",
                     status: "affected",
                     version: "2.12.0",
                     versionType: "patch release",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-416",
                     description: "CWE-416 Use After Free",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-29T02:06:20.991Z",
            orgId: "36a55730-e66d-4d39-8ca6-3c3b3017965e",
            shortName: "OpenVPN",
         },
         references: [
            {
               url: "https://community.openvpn.net/openvpn/wiki/CVE-2023-46850",
            },
            {
               url: "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/",
            },
            {
               url: "https://www.debian.org/security/2023/dsa-5555",
            },
            {
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/",
            },
            {
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "36a55730-e66d-4d39-8ca6-3c3b3017965e",
      assignerShortName: "OpenVPN",
      cveId: "CVE-2023-46850",
      datePublished: "2023-11-11T00:15:07.076Z",
      dateReserved: "2023-10-27T13:38:49.496Z",
      dateUpdated: "2025-02-13T17:14:45.269Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-46849
Vulnerability from cvelistv5
Published
2023-11-11 00:05
Modified
2025-02-13 17:14
Severity ?
Summary
Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T20:53:21.915Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://community.openvpn.net/openvpn/wiki/CVE-2023-46849",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5555",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "OpenVPN 2 (Community)",
               vendor: "OpenVPN",
               versions: [
                  {
                     lessThanOrEqual: "2.6.6",
                     status: "affected",
                     version: "2.6.0",
                     versionType: "minor release",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               platforms: [
                  "Linux",
               ],
               product: "Access Server",
               vendor: "OpenVPN",
               versions: [
                  {
                     lessThanOrEqual: "2.11.3",
                     status: "affected",
                     version: "2.11.0",
                     versionType: "patch release",
                  },
                  {
                     lessThanOrEqual: "2.12.1",
                     status: "affected",
                     version: "2.12.0",
                     versionType: "patch release",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-369",
                     description: "CWE-369 Divide By Zero",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-29T02:06:19.217Z",
            orgId: "36a55730-e66d-4d39-8ca6-3c3b3017965e",
            shortName: "OpenVPN",
         },
         references: [
            {
               url: "https://community.openvpn.net/openvpn/wiki/CVE-2023-46849",
            },
            {
               url: "https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/",
            },
            {
               url: "https://www.debian.org/security/2023/dsa-5555",
            },
            {
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/",
            },
            {
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "36a55730-e66d-4d39-8ca6-3c3b3017965e",
      assignerShortName: "OpenVPN",
      cveId: "CVE-2023-46849",
      datePublished: "2023-11-11T00:05:13.487Z",
      dateReserved: "2023-10-27T13:38:49.496Z",
      dateUpdated: "2025-02-13T17:14:44.708Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}