SB2017102412 - SUSE Linux update for openvpn



SB2017102412 - SUSE Linux update for openvpn

Published: October 24, 2017

Security Bulletin ID SB2017102412
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Medium 50% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Access control error (CVE-ID: CVE-2016-6329)

The vulnerability allows attackers to gain access to potentially sensitive information.

The vulnerability exists due to capturing of long duration Blowfish CBC mode encrypted TLS session. Repeated sending of communication protocol with parts of the plaintext helps attackers to reconstruct the secret information.

Successful exploitation of this vulnerability may allow a remote attacker to access potentially sensitive data.


2) Buffer overflow (CVE-ID: CVE-2017-12166)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error in the read_key() function when "Key Method 1" is used. A remote unauthenticated attacker can send a specially crafted key, trigger buffer overflow and cause denial of service or execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Denial of service (CVE-ID: CVE-2017-7478)

The vulnerability allows a remote authenticated attacker to cause DoS conditions on the target system.

The weakness exists due to improper user-input validation. A remote attacker can send a specially crafted P_CONTROL packet and cause the OpenVPN server process to stop running due to an ASSERT() exception.

Successful exploitation of the vulnerability results in denial of service.

4) Denial of service (CVE-ID: CVE-2017-7479)

The vulnerability allows a remote authenticated attacker to cause DoS conditions on the target system.

The weakness exists due to improper user-input validation. A remote attacker can cause the packet-IDs on the target server to be consumed, trigger the server process to hit an ASSERT() and stop running.

Successful exploitation of the vulnerability of results in denial of service.

Remediation

Install update from vendor's website.