Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.6.15 and 2.7alpha1 through 2.7rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client
{
"versions": [
{
"introduced": "2.6.0"
},
{
"fixed": "2.6.16"
},
{
"introduced": "0"
},
{
"last_affected": "2.7-alpha1"
},
{
"introduced": "0"
},
{
"last_affected": "2.7-alpha2"
},
{
"introduced": "0"
},
{
"last_affected": "2.7-alpha3"
},
{
"introduced": "0"
},
{
"last_affected": "2.7-beta1"
},
{
"introduced": "0"
},
{
"last_affected": "2.7-beta2"
},
{
"introduced": "0"
},
{
"last_affected": "2.7-beta3"
},
{
"introduced": "0"
},
{
"last_affected": "2.7-rc1"
}
]
}