Vulnerability Details CVE-2005-3409
OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.025
EPSS Ranking 84.5%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2005-3409
-
cpe:2.3:a:openvpn:openvpn:2.0
-
cpe:2.3:a:openvpn:openvpn:2.0.1_rc1
-
cpe:2.3:a:openvpn:openvpn:2.0.1_rc2
-
cpe:2.3:a:openvpn:openvpn:2.0.1_rc3
-
cpe:2.3:a:openvpn:openvpn:2.0.1_rc4
-
cpe:2.3:a:openvpn:openvpn:2.0.1_rc5
-
cpe:2.3:a:openvpn:openvpn:2.0.1_rc6
-
cpe:2.3:a:openvpn:openvpn:2.0.1_rc7
-
cpe:2.3:a:openvpn:openvpn:2.0.2_rc1
-
cpe:2.3:a:openvpn:openvpn:2.0.3_rc1
-
cpe:2.3:a:openvpn:openvpn:2.0_beta1
-
cpe:2.3:a:openvpn:openvpn:2.0_beta10
-
cpe:2.3:a:openvpn:openvpn:2.0_beta11
-
cpe:2.3:a:openvpn:openvpn:2.0_beta12
-
cpe:2.3:a:openvpn:openvpn:2.0_beta13
-
cpe:2.3:a:openvpn:openvpn:2.0_beta15
-
cpe:2.3:a:openvpn:openvpn:2.0_beta16
-
cpe:2.3:a:openvpn:openvpn:2.0_beta17
-
cpe:2.3:a:openvpn:openvpn:2.0_beta18
-
cpe:2.3:a:openvpn:openvpn:2.0_beta19
-
cpe:2.3:a:openvpn:openvpn:2.0_beta2
-
cpe:2.3:a:openvpn:openvpn:2.0_beta20
-
cpe:2.3:a:openvpn:openvpn:2.0_beta28
-
cpe:2.3:a:openvpn:openvpn:2.0_beta3
-
cpe:2.3:a:openvpn:openvpn:2.0_beta4
-
cpe:2.3:a:openvpn:openvpn:2.0_beta5
-
cpe:2.3:a:openvpn:openvpn:2.0_beta6
-
cpe:2.3:a:openvpn:openvpn:2.0_beta7
-
cpe:2.3:a:openvpn:openvpn:2.0_beta8
-
cpe:2.3:a:openvpn:openvpn:2.0_beta9
-
cpe:2.3:a:openvpn:openvpn:2.0_rc1
-
cpe:2.3:a:openvpn:openvpn:2.0_rc10
-
cpe:2.3:a:openvpn:openvpn:2.0_rc11
-
cpe:2.3:a:openvpn:openvpn:2.0_rc12
-
cpe:2.3:a:openvpn:openvpn:2.0_rc13
-
cpe:2.3:a:openvpn:openvpn:2.0_rc14
-
cpe:2.3:a:openvpn:openvpn:2.0_rc15
-
cpe:2.3:a:openvpn:openvpn:2.0_rc16
-
cpe:2.3:a:openvpn:openvpn:2.0_rc17
-
cpe:2.3:a:openvpn:openvpn:2.0_rc18
-
cpe:2.3:a:openvpn:openvpn:2.0_rc19
-
cpe:2.3:a:openvpn:openvpn:2.0_rc2
-
cpe:2.3:a:openvpn:openvpn:2.0_rc20
-
cpe:2.3:a:openvpn:openvpn:2.0_rc21
-
cpe:2.3:a:openvpn:openvpn:2.0_rc3
-
cpe:2.3:a:openvpn:openvpn:2.0_rc4
-
cpe:2.3:a:openvpn:openvpn:2.0_rc5
-
cpe:2.3:a:openvpn:openvpn:2.0_rc6
-
cpe:2.3:a:openvpn:openvpn:2.0_rc7
-
cpe:2.3:a:openvpn:openvpn:2.0_rc8
-
cpe:2.3:a:openvpn:openvpn:2.0_rc9
-
cpe:2.3:a:openvpn:openvpn:2.0_test1
-
cpe:2.3:a:openvpn:openvpn:2.0_test10
-
cpe:2.3:a:openvpn:openvpn:2.0_test11
-
cpe:2.3:a:openvpn:openvpn:2.0_test12
-
cpe:2.3:a:openvpn:openvpn:2.0_test14
-
cpe:2.3:a:openvpn:openvpn:2.0_test15
-
cpe:2.3:a:openvpn:openvpn:2.0_test16
-
cpe:2.3:a:openvpn:openvpn:2.0_test17
-
cpe:2.3:a:openvpn:openvpn:2.0_test18
-
cpe:2.3:a:openvpn:openvpn:2.0_test19
-
cpe:2.3:a:openvpn:openvpn:2.0_test2
-
cpe:2.3:a:openvpn:openvpn:2.0_test20
-
cpe:2.3:a:openvpn:openvpn:2.0_test21
-
cpe:2.3:a:openvpn:openvpn:2.0_test22
-
cpe:2.3:a:openvpn:openvpn:2.0_test23
-
cpe:2.3:a:openvpn:openvpn:2.0_test24
-
cpe:2.3:a:openvpn:openvpn:2.0_test26
-
cpe:2.3:a:openvpn:openvpn:2.0_test27
-
cpe:2.3:a:openvpn:openvpn:2.0_test29
-
cpe:2.3:a:openvpn:openvpn:2.0_test3
-
cpe:2.3:a:openvpn:openvpn:2.0_test5
-
cpe:2.3:a:openvpn:openvpn:2.0_test6
-
cpe:2.3:a:openvpn:openvpn:2.0_test7
-
cpe:2.3:a:openvpn:openvpn:2.0_test8
-
cpe:2.3:a:openvpn:openvpn:2.0_test9
-
cpe:2.3:a:openvpn:openvpn_access_server:2.0.1
-
cpe:2.3:a:openvpn:openvpn_access_server:2.0.2