CVE-2005-2533 : Detail

CVE-2005-2533

0.27%V4
Local
2005-08-24
02h00 +00:00
2005-09-23
07h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 2.1 AV:L/AC:L/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Openvpn>>Openvpn >> Version 2.0

Openvpn>>Openvpn >> Version 2.0.1_rc1

Openvpn>>Openvpn >> Version 2.0.1_rc2

Openvpn>>Openvpn >> Version 2.0.1_rc3

Openvpn>>Openvpn >> Version 2.0.1_rc4

Openvpn>>Openvpn >> Version 2.0.1_rc5

Openvpn>>Openvpn >> Version 2.0.1_rc6

Openvpn>>Openvpn >> Version 2.0.1_rc7

Openvpn>>Openvpn >> Version 2.0_beta1

Openvpn>>Openvpn >> Version 2.0_beta2

Openvpn>>Openvpn >> Version 2.0_beta3

Openvpn>>Openvpn >> Version 2.0_beta4

Openvpn>>Openvpn >> Version 2.0_beta5

Openvpn>>Openvpn >> Version 2.0_beta6

Openvpn>>Openvpn >> Version 2.0_beta7

Openvpn>>Openvpn >> Version 2.0_beta8

Openvpn>>Openvpn >> Version 2.0_beta9

Openvpn>>Openvpn >> Version 2.0_beta10

Openvpn>>Openvpn >> Version 2.0_beta11

Openvpn>>Openvpn >> Version 2.0_beta12

Openvpn>>Openvpn >> Version 2.0_beta13

Openvpn>>Openvpn >> Version 2.0_beta15

Openvpn>>Openvpn >> Version 2.0_beta16

Openvpn>>Openvpn >> Version 2.0_beta17

Openvpn>>Openvpn >> Version 2.0_beta18

Openvpn>>Openvpn >> Version 2.0_beta19

Openvpn>>Openvpn >> Version 2.0_beta20

Openvpn>>Openvpn >> Version 2.0_beta28

Openvpn>>Openvpn >> Version 2.0_rc1

Openvpn>>Openvpn >> Version 2.0_rc2

Openvpn>>Openvpn >> Version 2.0_rc3

Openvpn>>Openvpn >> Version 2.0_rc4

Openvpn>>Openvpn >> Version 2.0_rc5

Openvpn>>Openvpn >> Version 2.0_rc6

Openvpn>>Openvpn >> Version 2.0_rc7

Openvpn>>Openvpn >> Version 2.0_rc8

Openvpn>>Openvpn >> Version 2.0_rc9

Openvpn>>Openvpn >> Version 2.0_rc10

Openvpn>>Openvpn >> Version 2.0_rc11

Openvpn>>Openvpn >> Version 2.0_rc12

Openvpn>>Openvpn >> Version 2.0_rc13

Openvpn>>Openvpn >> Version 2.0_rc14

Openvpn>>Openvpn >> Version 2.0_rc15

Openvpn>>Openvpn >> Version 2.0_rc16

Openvpn>>Openvpn >> Version 2.0_rc17

Openvpn>>Openvpn >> Version 2.0_rc18

Openvpn>>Openvpn >> Version 2.0_rc19

Openvpn>>Openvpn >> Version 2.0_rc20

Openvpn>>Openvpn >> Version 2.0_rc21

Openvpn>>Openvpn >> Version 2.0_test1

Openvpn>>Openvpn >> Version 2.0_test2

Openvpn>>Openvpn >> Version 2.0_test3

Openvpn>>Openvpn >> Version 2.0_test5

Openvpn>>Openvpn >> Version 2.0_test6

Openvpn>>Openvpn >> Version 2.0_test7

Openvpn>>Openvpn >> Version 2.0_test8

Openvpn>>Openvpn >> Version 2.0_test9

Openvpn>>Openvpn >> Version 2.0_test10

Openvpn>>Openvpn >> Version 2.0_test11

Openvpn>>Openvpn >> Version 2.0_test12

Openvpn>>Openvpn >> Version 2.0_test14

Openvpn>>Openvpn >> Version 2.0_test15

Openvpn>>Openvpn >> Version 2.0_test16

Openvpn>>Openvpn >> Version 2.0_test17

Openvpn>>Openvpn >> Version 2.0_test18

Openvpn>>Openvpn >> Version 2.0_test19

Openvpn>>Openvpn >> Version 2.0_test20

Openvpn>>Openvpn >> Version 2.0_test21

Openvpn>>Openvpn >> Version 2.0_test22

Openvpn>>Openvpn >> Version 2.0_test23

Openvpn>>Openvpn >> Version 2.0_test24

Openvpn>>Openvpn >> Version 2.0_test26

Openvpn>>Openvpn >> Version 2.0_test27

Openvpn>>Openvpn >> Version 2.0_test29

References

http://secunia.com/advisories/17103
Tags : third-party-advisory, x_refsource_SECUNIA
http://openvpn.net/changelog.html
Tags : x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDKSA-2005:145
Tags : vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2005/dsa-851
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/16463
Tags : third-party-advisory, x_refsource_SECUNIA