SB2018011603 - Multiple vulnerabilities in SoftEther VPN



SB2018011603 - Multiple vulnerabilities in SoftEther VPN

Published: January 16, 2018

Security Bulletin ID SB2018011603
Severity
Low
Patch available
YES
Number of vulnerabilities 11
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 11 secuirty vulnerabilities.


1) Buffer over-read (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to buffer overread in ParseL2TPPacket(). A remote attacker can trigger memory corruption and cause the running server process to crash.

Successful exploitation of the vulnerability results in denial of service.

2) Memory corruption (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to boundary error in IcmpParseResult. A remote attacker can trigger memory corruption and cause the running server process to crash.

Successful exploitation of the vulnerability results in denial of service.

3) Memory corruption (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to missing bounds check in ParseUDP(). A remote attacker can trigger invalid memory access and cause the running server process to crash.

Successful exploitation of the vulnerability results in denial of service.

4) Out-of-bounds read (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to out-of-bounds read in IPsec_PPP.c. A remote attacker can trigger invalid memory access and cause the running server process to crash.

Successful exploitation of the vulnerability results in denial of service.

5) Memory corruption (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to overlapping parameters to memcpy() via StrToIp6(). A remote attacker can trigger memory corruption and cause the running server process to crash.

Successful exploitation of the vulnerability results in denial of service.

6) Memory corruption (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to PACK ReadValue() crash. A remote attacker can trigger memory corruption and cause the running server process to crash.

Successful exploitation of the vulnerability results in denial of service.

7) Memory corruption (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to potential use of uninitialized memory via IPToInAddr6(). A remote attacker can trigger memory corruption and cause the running server process to crash.

Successful exploitation of the vulnerability results in denial of service.

8) Resource exhaustion (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to memory leak in NnReadDnsRecord. A remote attacker can trigger excessive memory exhaustion and cause the running server process to crash.

9) Resource exhaustion (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to memory leak in RadiusLogin(). A remote attacker can trigger excessive memory exhaustion and cause the running server process to crash.

10) Resource exhaustion (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to memory leak via ParsePacketIPv4WithDummyMacHeader. A remote attacker can trigger excessive memory exhaustion and cause the running server process to crash.

11) Resource exhaustion (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to memory leak in OpenVPN server code. A remote attacker can trigger excessive memory exhaustion and cause the running server process to crash.

Remediation

Install update from vendor's website.