infradead OpenConnect 2.23

CPE Details

infradead OpenConnect 2.23
2.23
2010-11-12
15h11 +00:00
2010-11-19
17h31 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:infradead:openconnect:2.23:*:*:*:*:*:*:*

Informations

Vendor

infradead

Product

openconnect

Version

2.23

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-12105 2020-04-23 14h15 +00:00 OpenConnect through 8.08 mishandles negative return values from X509_check_ function calls, which might assist attackers in performing man-in-the-middle attacks.
5.9
Medium
CVE-2013-7098 2020-02-13 21h32 +00:00 OpenConnect VPN client with GnuTLS before 5.02 contains a heap overflow if MTU is increased on reconnection.
9.8
Critical
CVE-2019-16239 2019-09-17 09h37 +00:00 process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
9.8
Critical
CVE-2012-6128 2013-02-24 18h00 +00:00 Multiple stack-based buffer overflows in http.c in OpenConnect before 4.08 allow remote VPN gateways to cause a denial of service (application crash) via a long (1) hostname, (2) path, or (3) cookie list in a response.
5
CVE-2012-3291 2012-06-07 18h00 +00:00 Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
7.8
CVE-2010-3902 2010-10-12 19h00 +00:00 OpenConnect before 2.26 places the webvpn cookie value in the debugging output, which might allow remote attackers to obtain sensitive information by reading this output, as demonstrated by output posted to the public openconnect-devel mailing list.
5