CWE
NVD-CWE-Other
Advisory Published
Updated

CVE-2005-2532

First published: Wed Aug 24 2005(Updated: )

OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
OpenVPN Monitor=2.0_beta13
OpenVPN Monitor=2.0_rc9
OpenVPN Monitor=2.0_test19
OpenVPN Monitor=2.0
OpenVPN Monitor=2.0_test17
OpenVPN Monitor=2.0_test10
OpenVPN Monitor=2.0_test23
OpenVPN Monitor=2.0_beta20
OpenVPN Monitor=2.0.1_rc3
OpenVPN Monitor=2.0_beta19
OpenVPN Monitor=2.0_rc19
OpenVPN Monitor=2.0_beta1
OpenVPN Monitor=2.0_rc21
OpenVPN Monitor=2.0_beta9
OpenVPN Monitor=2.0.1_rc4
OpenVPN Monitor=2.0.1_rc2
OpenVPN Monitor=2.0_test26
OpenVPN Monitor=2.0_rc2
OpenVPN Monitor=2.0_test1
OpenVPN Monitor=2.0_beta16
OpenVPN Monitor=2.0_beta10
OpenVPN Monitor=2.0_rc20
OpenVPN Monitor=2.0_test14
OpenVPN Monitor=2.0_test6
OpenVPN Monitor=2.0_test12
OpenVPN Monitor=2.0_rc3
OpenVPN Monitor=2.0_beta15
OpenVPN Monitor=2.0_rc12
OpenVPN Monitor=2.0_beta8
OpenVPN Monitor=2.0_test3
OpenVPN Monitor=2.0_beta5
OpenVPN Monitor=2.0_beta18
OpenVPN Monitor=2.0_rc5
OpenVPN Monitor=2.0_rc6
OpenVPN Monitor=2.0_rc11
OpenVPN Monitor=2.0_rc7
OpenVPN Monitor=2.0_rc4
OpenVPN Monitor=2.0_beta2
OpenVPN Monitor=2.0_rc16
OpenVPN Monitor=2.0_test29
OpenVPN Monitor=2.0_beta3
OpenVPN Monitor=2.0_test9
OpenVPN Monitor=2.0_test27
OpenVPN Monitor=2.0_test21
OpenVPN Monitor=2.0_beta28
OpenVPN Monitor=2.0_rc17
OpenVPN Monitor=2.0_test5
OpenVPN Monitor=2.0_test20
OpenVPN Monitor=2.0_rc10
OpenVPN Monitor=2.0_rc8
OpenVPN Monitor=2.0.1_rc1
OpenVPN Monitor=2.0_test22
OpenVPN Monitor=2.0_test11
OpenVPN Monitor=2.0_test24
OpenVPN Monitor=2.0.1_rc6
OpenVPN Monitor=2.0_test7
OpenVPN Monitor=2.0.1_rc7
OpenVPN Monitor=2.0_rc14
OpenVPN Monitor=2.0_rc18
OpenVPN Monitor=2.0_beta17
OpenVPN Monitor=2.0_test15
OpenVPN Monitor=2.0_test8
OpenVPN Monitor=2.0_rc1
OpenVPN Monitor=2.0.1_rc5
OpenVPN Monitor=2.0_beta4
OpenVPN Monitor=2.0_test2
OpenVPN Monitor=2.0_beta6
OpenVPN Monitor=2.0_rc15
OpenVPN Monitor=2.0_beta7
OpenVPN Monitor=2.0_beta11
OpenVPN Monitor=2.0_test18
OpenVPN Monitor=2.0_test16
OpenVPN Monitor=2.0_rc13
OpenVPN Monitor=2.0_beta12

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2005-2532?

    CVE-2005-2532 is classified as a denial of service vulnerability that can lead to unexpected client disconnections.

  • How do I fix CVE-2005-2532?

    To mitigate CVE-2005-2532, upgrade to OpenVPN version 2.0.1 or later to ensure proper error queue flushing.

  • What types of attacks can exploit CVE-2005-2532?

    CVE-2005-2532 can be exploited by remote authenticated attackers sending a series of non-decryptable packets.

  • Is my version of OpenVPN vulnerable to CVE-2005-2532?

    If you are using OpenVPN versions prior to 2.0.1, you are vulnerable to CVE-2005-2532.

  • What impact does CVE-2005-2532 have on my OpenVPN service?

    CVE-2005-2532 can cause service disruptions by forcibly disconnecting clients, impacting overall availability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203