Lucene search

K
amazonAmazonALAS-2013-201
HistoryJun 11, 2013 - 10:47 p.m.

Low: openvpn

2013-06-1122:47:00
alas.aws.amazon.com
10

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

0.005 Low

EPSS

Percentile

75.9%

Issue Overview:

The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher.

Affected Packages:

openvpn

Issue Correction:
Run yum update openvpn to update your system.

New Packages:

i686:  
    openvpn-2.3.1-1.7.amzn1.i686  
    openvpn-debuginfo-2.3.1-1.7.amzn1.i686  
  
src:  
    openvpn-2.3.1-1.7.amzn1.src  
  
x86_64:  
    openvpn-debuginfo-2.3.1-1.7.amzn1.x86_64  
    openvpn-2.3.1-1.7.amzn1.x86_64  

Additional References

Red Hat: CVE-2013-2061

Mitre: CVE-2013-2061

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

0.005 Low

EPSS

Percentile

75.9%