OpenVPN Server 2.0.x < 2.0.3 Remote Code Execution Vulnerability

High Nessus Plugin ID 128776


An application on the remote Windows host is affected by a remote code execution vulnerability.


According to its self-reported version number, the version of OpenVPN server installed on the remote Windows host is version 2.0.x prior to 2.0.3. It is, therefore, affected by a remote command execution vulnerability in its DHCP component due to a format string vulnerability. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary commands with the privileges of the user running the server.


Upgrade to OpenVPN 2.0.3 or later.

See Also

Plugin Details

Severity: High

ID: 128776

File Name: openvpn_2_0_3.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 2019/09/16

Updated: 2019/10/31

Dependencies: 125356

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2005-3393

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:openvpn:openvpn

Required KB Items: installed_sw/OpenVPN Server

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2005/11/01

Vulnerability Publication Date: 2005/11/01

Reference Information

CVE: CVE-2005-3393

BID: 15239