OpenVPN における任意のコマンドを実行される脆弱性
| Title |
OpenVPN における任意のコマンドを実行される脆弱性
|
| Summary |
OpenVPN は、Windows 以外のシステム上で稼動している際、シェルメタキャラクタに関する処理に不備があるため、任意のコマンドを実行される脆弱性が存在します。
|
| Possible impacts |
リモートサーバにより、巧妙に細工された (1) lladdr および (2) iproute 設定ディレクティブを介して、任意のコマンドを実行される可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
Aug. 4, 2008, midnight |
| Registration Date |
Sept. 25, 2012, 5:17 p.m. |
| Last Update |
Sept. 25, 2012, 5:17 p.m. |
|
CVSS2.0 : 危険
|
| Score |
7.6
|
| Vector |
AV:N/AC:H/Au:N/C:C/I:C/A:C |
Affected System
| OpenVPN Technologies |
|
OpenVPN 2.1-beta14 から 2.1-rc8
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2012年09月25日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2008-3459
| Summary |
Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters.
|
| Summary |
The following events must take place for successful exploitation: 1) the client has agreed to allow the server to push configuration directives to it by including "pull" or the macro "client" in its configuration file 2) the client succesfully authenticates the server 3) the server is malicious or has been compromised and is under the control of the attacker 4) the client is running a non-Windows OS.
|
| Publication Date |
Aug. 5, 2008, 4:41 a.m. |
| Registration Date |
Jan. 29, 2021, 1:40 p.m. |
| Last Update |
Aug. 8, 2017, 10:31 a.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:openvpn:openvpn:2.1:beta-14:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:openvpn:openvpn:2.1:beta-15:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:openvpn:openvpn:2.1:beta-16:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:openvpn:openvpn:2.1:rc_1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:openvpn:openvpn:2.1:rc_2:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:openvpn:openvpn:2.1:rc_3:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:openvpn:openvpn:2.1:rc_4:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:openvpn:openvpn:2.1:rc_5:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:openvpn:openvpn:2.1:rc_6:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:openvpn:openvpn:2.1:rc_7:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:openvpn:openvpn:2.1:rc_8:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List