OpenVPN Client 2.0.x < 2.0.6 Remote Code Execution Vulnerability

high Nessus Plugin ID 125643

Synopsis

An application on the remote Windows host is affected by a remote code execution vulnerability

Description

According to its self-reported version number, the version of OpenVPN client installed on the remote Windows host is 2.0.x prior to 2.0.6. It is, therefore, affected by a remote command execution vulnerability. An unauthenticated remote attacker can exploit this by deploying a malicious OpenVPN server and executing code on clients' systems by using setenv with the LD_PRELOAD environment variable.

Solution

Upgrade to OpenVPN 2.0.6 or later.

See Also

http://www.nessus.org/u?6534e9a2

Plugin Details

Severity: High

ID: 125643

File Name: openvpn_2_0_6.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 6/3/2019

Updated: 10/31/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2006-1629

CVSS v3

Risk Factor: High

Base Score: 8

Temporal Score: 7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:openvpn:openvpn

Required KB Items: installed_sw/OpenVPN

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/5/2006

Vulnerability Publication Date: 4/5/2006

Reference Information

CVE: CVE-2006-1629

BID: 17392