CVE-2005-3409
Publication date 2 November 2005
Last updated 24 July 2024
Ubuntu priority
OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.
Status
Package | Ubuntu Release | Status |
---|---|---|
openvpn | 7.04 feisty |
Fixed 2.0.6-1
|
6.10 edgy |
Fixed 2.0.6-1
|
|
6.06 LTS dapper |
Fixed 2.0.6-1
|