[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2017:2838-1 -- SLES openvpn

ID: oval:org.secpod.oval:def:89044841Date: (C)2021-07-20   (M)2022-10-10
Class: PATCHFamily: unix




This update for openvpn fixes the following security issues: - CVE-2017-12166: OpenVPN was vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution. - CVE-2016-6329: Now show which ciphers should no longer be used in openvpn --show-ciphers to avoid the SWEET32 attack - CVE-2017-7478: OpenVPN was vulnerable to unauthenticated Denial of Service of server via received large control packet. - CVE-2017-7479: OpenVPN was vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker. - Some other hardening fixes have also been applied

Platform:
SUSE Linux Enterprise Server 11 SP4
Product:
openvpn
Reference:
SUSE-SU-2017:2838-1
CVE-2016-6329
CVE-2017-12166
CVE-2017-7478
CVE-2017-7479
CVE    4
CVE-2016-6329
CVE-2017-12166
CVE-2017-7479
CVE-2017-7478
...
CPE    2
cpe:/a:openvpn:openvpn
cpe:/o:suse:suse_linux_enterprise_server:11:sp4

© SecPod Technologies