Uncontrolled search path element vulnerability in OpenVPN - CVE-2021-3606ID: oval:org.secpod.oval:def:73997 | Date: (C)2021-07-19 (M)2021-11-19 |
Class: VULNERABILITY | Family: windows |
The host is installed with OpenVPN before 2.5.3 and is prone to uncontrolled search path element vulnerability. The flaw is present in the application, which fails to properly handle an issue in the OpenSSL configuration file. Successful exploitation could allow attackers to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the attackers to run arbitrary code with the same privilege level as the main OpenVPN process (OpenVPNConnect.exe).
Platform: |
Microsoft Windows 11 |
Microsoft Windows Server 2022 |
Microsoft Windows 10 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2019 |
Microsoft Windows Server |
Microsoft Windows 2000 |
Microsoft Windows XP |
Microsoft Windows Vista |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2008 |
Microsoft Windows 7 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows 8 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2012 R2 |