First published: Mon Aug 04 2008(Updated: )
Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVPN OpenVPN | =2.1-rc_2 | |
OpenVPN OpenVPN | =2.1-rc_8 | |
OpenVPN OpenVPN | =2.1-rc_5 | |
OpenVPN OpenVPN | =2.1-beta-14 | |
OpenVPN OpenVPN | =2.1-beta-15 | |
OpenVPN OpenVPN | =2.1-rc_7 | |
OpenVPN OpenVPN | =2.1-rc_4 | |
OpenVPN OpenVPN | =2.1-beta-16 | |
OpenVPN OpenVPN | =2.1-rc_1 | |
OpenVPN OpenVPN | =2.1-rc_6 | |
OpenVPN OpenVPN | =2.1-rc_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3459 is considered a high severity vulnerability due to its potential for arbitrary command execution.
To fix CVE-2008-3459, upgrade your OpenVPN installation to the latest version that is not affected, ensuring it is beyond 2.1-rc8.
CVE-2008-3459 affects users running OpenVPN versions 2.1-beta14 through 2.1-rc8 on non-Windows systems.
CVE-2008-3459 can be exploited by sending crafted lladdr and iproute configuration directives that may execute arbitrary commands.
CVE-2008-3459 was disclosed in July 2008.