First published: Tue Nov 01 2005(Updated: )
Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVPN Monitor | =2.0 | |
OpenVPN Monitor | =2.0_beta11 | |
OpenVPN Access Server | =2.0.1 | |
OpenVPN Access Server | =2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3393 is considered critical due to its potential for remote code execution.
To fix CVE-2005-3393, upgrade to a patched version of OpenVPN, specifically 2.0.3 or later.
CVE-2005-3393 affects OpenVPN versions 2.0, 2.0_beta11, and OpenVPN Access Server versions 2.0.1 and 2.0.2.
Yes, CVE-2005-3393 can be exploited by remote clients through malicious DHCP option commands.
CVE-2005-3393 is a format string vulnerability that allows for arbitrary code execution.