OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.
Link | Tags |
---|---|
http://secunia.com/advisories/17447 | third party advisory |
http://secunia.com/advisories/17480 | third party advisory |
http://openvpn.net/changelog.html | |
http://www.novell.com/linux/security/advisories/2005_25_sr.html | vendor advisory |
http://www.gentoo.org/security/en/glsa/glsa-200511-07.xml | vendor advisory |
http://www.securityfocus.com/bid/15270 | vdb entry |
http://www.securityfocus.com/archive/1/415487 | vendor advisory |
http://secunia.com/advisories/17452 | third party advisory |
http://www.osvdb.org/20416 | vdb entry |
http://www.debian.org/security/2005/dsa-885 | vendor advisory |
http://secunia.com/advisories/17376 | patch vendor advisory third party advisory |