SoftEther VPN 4.29 B9680 RTM freeware
SoftEther VPN is most definitely one of the most powerful and reliable VPN software available on the market that targets especially companies seeking for a free alternative to creating and maintaining an architecture of VPN servers.
Author | SoftEther Project |
Released | 2019-02-28 |
Filesize | 44.80 MB |
Downloads | 208 |
OS | Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64 |
Installation | Instal And Uninstall |
Keywords | VPN connection, VPN tunnel, HTTPS protocol, VPN, Anonymity, Tunnel, HTTPS |
Users' rating (14 rating) |
SoftEther VPN Free Download - we do not host any SoftEther VPN torrent files or links of SoftEther VPN on rapidshare.com, depositfiles.com, megaupload.com etc. All SoftEther VPN download links are direct SoftEther VPN download from publisher site or their selected mirrors.
4.29 B9680 R | Feb 28, 2019 | New Release | Switched the license of SoftEther VPN from GPLv2 to Apache License 2.0. Text messages on source codes and UIs have been modified. Supports 4-digit expiration date on X.509 certificates. Replaced SHA-0 implementation. Improved integrity and security of C source codes. Fixed several buffer overflows and integer overflows. Enforced NULL pointer checks. Fixed problems on the size of malloc() and Zero Memory functions. These problems include a vulnerability that a malformed packet will cause the buffer overflow at the receive path. This vulnerability may occur abnormal process exit with the buffer security check mechanism built-in with SoftEther VPN binary. Although this buffer overflow can theoretically bypass the security check in theory, in the actual binary it is detected by the buffer security check inserted by the C compiler and the process is forcibly terminated. Therefore, as a result, it can be abused by a DoS attacker. |
4.25 B9656 R | Jan 15, 2018 | New Release | There are 11 vulnerabilities on SoftEther VPN. There vulnerabilities are found by the source code audit process conducted by Max Planck Institute for Molecular Genetics andMr. Guido Vranken in late 2017. This build fixes all of these vulnerabilities. 7 missing memory boundaries checks and similar memory problems. There are no risk of arbitrary code execution or intrusion on these bugs in my analysis. However, these problems may lead to crash the running server process. So these bugs must be fixed. |