First published: Thu Apr 06 2006(Updated: )
OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVPN Monitor | =2.0 | |
OpenVPN Monitor | =2.0.4 | |
OpenVPN Access Server | =2.0.1 | |
OpenVPN Access Server | =2.0.2 | |
OpenVPN Access Server | =2.0.3 | |
OpenVPN Access Server | =2.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1629 is classified as a critical vulnerability due to its ability to allow execution of arbitrary code on client machines.
To fix CVE-2006-1629, users should upgrade to OpenVPN version 2.0.6 or later, which addresses the vulnerability.
OpenVPN versions 2.0 through 2.0.5, including OpenVPN Access Server versions 2.0.1 through 2.0.5, are affected by CVE-2006-1629.
Yes, CVE-2006-1629 can be exploited remotely by malicious servers manipulating the LD_PRELOAD environment variable.
CVE-2006-1629 is an arbitrary code execution vulnerability that affects the OpenVPN client.