9
CVSSv2

CVE-2006-1629

Published: 06/04/2006 Updated: 12/05/2020
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

OpenVPN 2.0 up to and including 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.

Vulnerable Product Search on Vulmon Subscribe to Product

openvpn openvpn 2.0

openvpn openvpn access server 2.0.3

openvpn openvpn 2.0.4

openvpn openvpn access server 2.0.5

openvpn openvpn access server 2.0.1

openvpn openvpn access server 2.0.2

Vendor Advisories

Debian Bug report logs - #360559 Remote root exploit against connected clients Package: openvpn; Maintainer for openvpn is Bernhard Schmidt <berni@debianorg>; Source for openvpn is src:openvpn (PTS, buildd, popcon) Reported by: Hendrik Weimer <hendrik@enyode> Date: Mon, 3 Apr 2006 08:48:02 UTC Severity: important ...
Hendrik Weimer discovered that OpenVPN, the Virtual Private Network daemon, allows to push environment variables to a client allowing a malicious VPN server to take over connected clients The old stable distribution (woody) does not contain openvpn packages For the stable distribution (sarge) this problem has been fixed in version 20-1sarge3 Fo ...