[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3900-1 openvpn -- openvpn

ID: oval:org.secpod.oval:def:602962Date: (C)2017-07-05   (M)2023-12-20
Class: PATCHFamily: unix




Several issues were discovered in openvpn, a virtual private network application. CVE-2017-7479 It was discovered that openvpn did not properly handle the rollover of packet identifiers. This would allow an authenticated remote attacker to cause a denial-of-service via application crash. CVE-2017-7508 Guido Vranken discovered that openvpn did not properly handle specific malformed IPv6 packets. This would allow a remote attacker to cause a denial-of-service via application crash. CVE-2017-7520 Guido Vranken discovered that openvpn did not properly handle clients connecting to an HTTP proxy with NTLMv2 authentication. This would allow a remote attacker to cause a denial-of-service via application crash, or potentially leak sensitive information like the user"s proxy password. CVE-2017-7521 Guido Vranken discovered that openvpn did not properly handle some x509 extensions. This would allow a remote attacker to cause a denial-of-service via application crash.

Platform:
Debian 8.x
Debian 9.x
Product:
openvpn
Reference:
DSA-3900-1
CVE-2017-7479
CVE-2017-7508
CVE-2017-7520
CVE-2017-7521
CVE    4
CVE-2017-7508
CVE-2017-7521
CVE-2017-7520
CVE-2017-7479
...
CPE    3
cpe:/o:debian:debian_linux:8.x
cpe:/a:openvpn:openvpn
cpe:/o:debian:debian_linux:9.x

© SecPod Technologies