CVE-2017-7522
27.06.2017, 13:29
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service by authenticated remote attacker via sending a certificate with an embedded NULL character.Enginsight
Vendor | Product | Version |
---|---|---|
openvpn | openvpn | 𝑥 ≤ 2.3.16 |
openvpn | openvpn | 2.4.0 |
openvpn | openvpn | 2.4.0:alpha2 |
openvpn | openvpn | 2.4.0:beta1 |
openvpn | openvpn | 2.4.0:beta2 |
openvpn | openvpn | 2.4.0:rc1 |
openvpn | openvpn | 2.4.0:rc2 |
openvpn | openvpn | 2.4.1 |
openvpn | openvpn | 2.4.2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
- CWE-476 - NULL Pointer DereferenceA NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
References