Lucene search

K
archlinuxArchLinuxASA-201709-21
HistorySep 28, 2017 - 12:00 a.m.

[ASA-201709-21] openvpn: arbitrary code execution

2017-09-2800:00:00
security.archlinux.org
8

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

80.2%

Arch Linux Security Advisory ASA-201709-21

Severity: Medium
Date : 2017-09-28
CVE-ID : CVE-2017-12166
Package : openvpn
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-420

Summary

The package openvpn before version 2.4.4-1 is vulnerable to arbitrary
code execution.

Resolution

Upgrade to 2.4.4-1.

pacman -Syu “openvpn>=2.4.4-1”

The problem has been fixed upstream in version 2.4.4.

Workaround

Ensure ‘key-method 2’ is used (default value).

Description

The bounds check in the read_key() function in OpenVPN before 2.4.4 and
2.3.18 was performed after using the value, instead of before. If
‘key-method 1’ is used, this allowed an attacker to send a malformed
packet to trigger a stack buffer overflow.
Note that ‘key-method 1’ has been replaced by ‘key method 2’ as the
default in OpenVPN 2.0 (released on 2005-04-17), and explicitly
deprecated in 2.4 and marked for removal in 2.5. This should limit the
amount of users impacted by this issue.

Impact

A remote attacker is able to execute arbitrary code on the affected
host when an old key-method is configured.

References

https://community.openvpn.net/openvpn/wiki/CVE-2017-12166
https://github.com/OpenVPN/openvpn/commit/3b1a61e9fb27213c46f76312f4065816bee8ed01
https://security.archlinux.org/CVE-2017-12166

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyopenvpn< 2.4.4-1UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

80.2%