ALT Vulnerability

This commit is contained in:
Иван Пепеляев 2025-01-07 09:05:12 +00:00
parent 81db9f2cb3
commit c1f11120ea
45 changed files with 65 additions and 11 deletions

View File

@ -160,6 +160,7 @@
"ID": "CVE-2019-3901",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3901",
"Impact": "Low",
"Public": "20190422"

View File

@ -1661,6 +1661,7 @@
"ID": "CVE-2019-3901",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3901",
"Impact": "Low",
"Public": "20190422"

View File

@ -62,6 +62,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -132,6 +132,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -62,6 +62,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -272,6 +272,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -249,6 +249,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -47,6 +47,7 @@
"ID": "CVE-2019-14823",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-358",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14823",
"Impact": "High",
"Public": "20191014"

View File

@ -85,7 +85,7 @@
"Source": "CVE"
}
],
"Description": "This update upgrades openvpn to version 2.6.12-alt1. \nSecurity Fix(es):\n\n * BDU:2024-02574: Уязвимость программного обеспечения OpenVPN, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-02585: Уязвимость опции --fragment программного обеспечения OpenVPN, связанная с ошибками при делении на ноль, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-05533: Уязвимость компонента Plug-in Handler программного обеспечения OpenVPN, позволяющая нарушителю загружать произвольные модули\n\n * CVE-2023-46849: Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.\n\n * CVE-2023-46850: Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.\n\n * CVE-2023-7235: The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables.\n\n * CVE-2024-24974: The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.\n\n * CVE-2024-27459: The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.\n\n * CVE-2024-27903: OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service.\n\n * CVE-2024-28882: OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session\n\n * CVE-2024-4877: description unavailable\n\n * CVE-2024-5594: description unavailable\n\n * #46933: Версия 2.6.5",
"Description": "This update upgrades openvpn to version 2.6.12-alt1. \nSecurity Fix(es):\n\n * BDU:2024-02574: Уязвимость программного обеспечения OpenVPN, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-02585: Уязвимость опции --fragment программного обеспечения OpenVPN, связанная с ошибками при делении на ноль, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-05533: Уязвимость компонента Plug-in Handler программного обеспечения OpenVPN, позволяющая нарушителю загружать произвольные модули\n\n * CVE-2023-46849: Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.\n\n * CVE-2023-46850: Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.\n\n * CVE-2023-7235: The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables.\n\n * CVE-2024-24974: The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.\n\n * CVE-2024-27459: The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.\n\n * CVE-2024-27903: OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service.\n\n * CVE-2024-28882: OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session\n\n * CVE-2024-4877: description unavailable\n\n * CVE-2024-5594: OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins.\n\n * #46933: Версия 2.6.5",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
@ -177,6 +177,12 @@
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-28882",
"Impact": "None",
"Public": "20240708"
},
{
"ID": "CVE-2024-5594",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-5594",
"Impact": "None",
"Public": "20250106"
}
],
"Bugzilla": [

View File

@ -160,6 +160,7 @@
"ID": "CVE-2019-3901",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3901",
"Impact": "Low",
"Public": "20190422"

View File

@ -1661,6 +1661,7 @@
"ID": "CVE-2019-3901",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3901",
"Impact": "Low",
"Public": "20190422"

View File

@ -62,6 +62,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -132,6 +132,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -62,6 +62,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -272,6 +272,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -249,6 +249,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -47,6 +47,7 @@
"ID": "CVE-2019-14823",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-358",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14823",
"Impact": "High",
"Public": "20191014"

View File

@ -166,6 +166,7 @@
"ID": "CVE-2019-3901",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3901",
"Impact": "Low",
"Public": "20190422"

View File

@ -1667,6 +1667,7 @@
"ID": "CVE-2019-3901",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3901",
"Impact": "Low",
"Public": "20190422"

View File

@ -68,6 +68,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -138,6 +138,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -68,6 +68,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -278,6 +278,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -255,6 +255,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -53,6 +53,7 @@
"ID": "CVE-2019-14823",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-358",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14823",
"Impact": "High",
"Public": "20191014"

View File

@ -91,7 +91,7 @@
"Source": "CVE"
}
],
"Description": "This update upgrades openvpn to version 2.6.12-alt1. \nSecurity Fix(es):\n\n * BDU:2024-02574: Уязвимость программного обеспечения OpenVPN, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-02585: Уязвимость опции --fragment программного обеспечения OpenVPN, связанная с ошибками при делении на ноль, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-05533: Уязвимость компонента Plug-in Handler программного обеспечения OpenVPN, позволяющая нарушителю загружать произвольные модули\n\n * CVE-2023-46849: Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.\n\n * CVE-2023-46850: Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.\n\n * CVE-2023-7235: The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables.\n\n * CVE-2024-24974: The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.\n\n * CVE-2024-27459: The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.\n\n * CVE-2024-27903: OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service.\n\n * CVE-2024-28882: OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session\n\n * CVE-2024-4877: description unavailable\n\n * CVE-2024-5594: description unavailable\n\n * #46933: Версия 2.6.5",
"Description": "This update upgrades openvpn to version 2.6.12-alt1. \nSecurity Fix(es):\n\n * BDU:2024-02574: Уязвимость программного обеспечения OpenVPN, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-02585: Уязвимость опции --fragment программного обеспечения OpenVPN, связанная с ошибками при делении на ноль, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-05533: Уязвимость компонента Plug-in Handler программного обеспечения OpenVPN, позволяющая нарушителю загружать произвольные модули\n\n * CVE-2023-46849: Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.\n\n * CVE-2023-46850: Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.\n\n * CVE-2023-7235: The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables.\n\n * CVE-2024-24974: The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.\n\n * CVE-2024-27459: The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.\n\n * CVE-2024-27903: OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service.\n\n * CVE-2024-28882: OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session\n\n * CVE-2024-4877: description unavailable\n\n * CVE-2024-5594: OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins.\n\n * #46933: Версия 2.6.5",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
@ -183,6 +183,12 @@
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-28882",
"Impact": "None",
"Public": "20240708"
},
{
"ID": "CVE-2024-5594",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-5594",
"Impact": "None",
"Public": "20250106"
}
],
"Bugzilla": [

File diff suppressed because one or more lines are too long

View File

@ -159,6 +159,7 @@
"ID": "CVE-2019-3901",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3901",
"Impact": "Low",
"Public": "20190422"

View File

@ -1660,6 +1660,7 @@
"ID": "CVE-2019-3901",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3901",
"Impact": "Low",
"Public": "20190422"

View File

@ -61,6 +61,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -131,6 +131,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -61,6 +61,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -271,6 +271,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -248,6 +248,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -46,6 +46,7 @@
"ID": "CVE-2019-14823",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-358",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14823",
"Impact": "High",
"Public": "20191014"

View File

@ -39,7 +39,7 @@
"Source": "CVE"
}
],
"Description": "This update upgrades openvpn to version 2.6.12-alt1. \nSecurity Fix(es):\n\n * CVE-2024-28882: OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session\n\n * CVE-2024-4877: description unavailable\n\n * CVE-2024-5594: description unavailable",
"Description": "This update upgrades openvpn to version 2.6.12-alt1. \nSecurity Fix(es):\n\n * CVE-2024-28882: OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session\n\n * CVE-2024-4877: description unavailable\n\n * CVE-2024-5594: OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
@ -57,6 +57,12 @@
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-28882",
"Impact": "None",
"Public": "20240708"
},
{
"ID": "CVE-2024-5594",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-5594",
"Impact": "None",
"Public": "20250106"
}
],
"AffectedCPEs": {

File diff suppressed because one or more lines are too long

View File

@ -165,6 +165,7 @@
"ID": "CVE-2019-3901",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3901",
"Impact": "Low",
"Public": "20190422"

View File

@ -1666,6 +1666,7 @@
"ID": "CVE-2019-3901",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3901",
"Impact": "Low",
"Public": "20190422"

View File

@ -67,6 +67,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -137,6 +137,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -67,6 +67,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -277,6 +277,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -254,6 +254,7 @@
"ID": "CVE-2019-3882",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
"Impact": "Low",
"Public": "20190424"

View File

@ -52,6 +52,7 @@
"ID": "CVE-2019-14823",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-358",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14823",
"Impact": "High",
"Public": "20191014"