{"id":"CVE-2005-2532","details":"OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted.","modified":"2026-01-27T04:06:06.824052Z","published":"2005-08-24T04:00:00Z","withdrawn":"2026-01-27T04:06:06.824052Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/16463"},{"type":"ADVISORY","url":"http://secunia.com/advisories/17103"},{"type":"ADVISORY","url":"http://www.debian.org/security/2005/dsa-851"},{"type":"FIX","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:145"},{"type":"WEB","url":"http://openvpn.net/changelog.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/14607"}],"schema_version":"1.7.3"}