FreeBSD : openvpn -- denial of service: malicious authenticated 'tap' client can deplete server virtual memory (1986449a-8b74-40fa-b7cc-0d8def8aad65)

Low Nessus Plugin ID 21391


The remote FreeBSD host is missing a security-related update.


James Yonan reports :

A malicious [authenticated] client in 'dev tap' ethernet bridging mode could theoretically flood the server with packets appearing to come from hundreds of thousands of different MAC addresses, causing the OpenVPN process to deplete system virtual memory as it expands its internal routing table.


Update the affected package.

See Also

Plugin Details

Severity: Low

ID: 21391

File Name: freebsd_pkg_1986449a8b7440fab7cc0d8def8aad65.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2006/05/13

Modified: 2013/06/21

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:openvpn, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2005/08/19

Vulnerability Publication Date: 2005/07/27

Reference Information

CVE: CVE-2005-2533