Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-11810
HistoryApr 27, 2020 - 12:00 a.m.

CVE-2020-11810

2020-04-2700:00:00
ubuntu.com
ubuntu.com
9

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.005 Low

EPSS

Percentile

76.4%

An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can
inject a data channel v2 (P_DATA_V2) packet using a victim’s peer-id.
Normally such packets are dropped, but if this packet arrives before the
data channel crypto parameters have been initialized, the victim’s
connection will be dropped. This requires careful timing due to the small
time window (usually within a few seconds) between the victim client
connection starting and the server PUSH_REPLY response back to the client.
This attack will only work if Negotiable Cipher Parameters (NCP) is in use.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchopenvpn< 2.4.4-2ubuntu1.5UNKNOWN
ubuntu20.04noarchopenvpn< 2.4.7-1ubuntu2.20.04.2UNKNOWN

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.005 Low

EPSS

Percentile

76.4%