Unrated severityNVD Advisory· Published Nov 11, 2023· Updated Jun 11, 2025
CVE-2023-46849
CVE-2023-46849
Description
Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.
Affected products
4- osv-coords2 versionspkg:deb/ubuntu/openvpn@2.6.5-0ubuntu1.1?arch=source&distro=manticpkg:rpm/opensuse/openvpn&distro=openSUSE%20Tumbleweed
< 2.6.5-0ubuntu1.1+ 1 more
- (no CPE)range: < 2.6.5-0ubuntu1.1
- (no CPE)range: < 2.6.7-1.1
- Range: 2.11.0
- OpenVPN/OpenVPN 2 (Community)v5Range: 2.6.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- community.openvpn.net/openvpn/wiki/CVE-2023-46849mitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3FS46ANNTAVLIQY56ZKGM5CBTRVBUNE/mitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O54I7D753V6PU6XBU26FEROD2DSHEJQ4/mitre
- openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/mitre
- www.debian.org/security/2023/dsa-5555mitre
News mentions
0No linked articles in our index yet.