Vulnerability Details : CVE-2006-1629
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
Vulnerability category: Execute code
Products affected by CVE-2006-1629
- cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn_access_server:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn_access_server:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn_access_server:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn_access_server:2.0.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-1629
0.82%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1629
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST |
References for CVE-2006-1629
-
http://www.securityfocus.com/bid/17392
Patch
-
http://www.vupen.com/english/advisories/2006/1261
Site en construction
-
http://www.novell.com/linux/security/advisories/2006_04_28.html
404 Page Not Found | SUSE
-
http://www.debian.org/security/2006/dsa-1045
[SECURITY] [DSA 1045-1] New OpenVPN packages fix arbitrary code execution
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:069
Mandriva
-
http://openvpn.net/changelog.html
Changelog For OpenVPN 2.1 | OpenVPNPatch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25667
OpenVPN setenv LD_PRELOAD code execution CVE-2006-1629 Vulnerability Report
-
http://sourceforge.net/mailarchive/forum.php?thread_id=10093825&forum_id=8482
Page not found - SourceForge.net
-
http://www.osreviews.net/reviews/security/openvpn-print
OS Reviews: Free and Open Source Software for GNU/Linux and more
Jump to