Executive Summary

Summary
Title New openvpn packages fix denial of service
Informations
Name DSA-851 First vendor Publication 2005-10-09
Vendor Debian Last vendor Modification 2005-10-09
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Several security related problems have been discovered in openvpn, a Virtual Private Network daemon. The Common Vulnerabilities and Exposures project identifies the following problems:

CAN-2005-2531

Wrong processing of failed certificate authentication when running with "verb 0" and without TLS authentication can lead to a denial of service by disconnecting the wrong client.

CAN-2005-2532

Wrong handling of packets that can't be decrypted on the server can lead to the disconnection of unrelated clients.

CAN-2005-2533

When running in "dev tap" Ethernet bridging mode, openvpn can exhaust its memory by receiving a large number of spoofed MAC addresses and hence denying service.

CAN-2005-2534

Simultaneous TCP connections from multiple clients with the same client certificate can cause a denial of service when --duplicate-cn is not enabled.

The old stable distribution (woody) does not contain openvpn packages.

For the stable distribution (sarge) these problems have been fixed in version 2.0-1sarge1.

For the unstable distribution (sid) these problems have been fixed in version 2.0.2-1.

We recommend that you upgrade your openvpn package.

Original Source

Url : http://www.debian.org/security/2005/dsa-851

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 74

OpenVAS Exploits

Date Description
2008-09-04 Name : FreeBSD Ports: openvpn
File : nvt/freebsd_openvpn.nasl
2008-09-04 Name : FreeBSD Ports: openvpn
File : nvt/freebsd_openvpn0.nasl
2008-09-04 Name : FreeBSD Ports: openvpn
File : nvt/freebsd_openvpn1.nasl
2008-09-04 Name : FreeBSD Ports: openvpn
File : nvt/freebsd_openvpn2.nasl
2008-01-17 Name : Debian Security Advisory DSA 851-1 (openvpn)
File : nvt/deb_851_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
18885 OpenVPN Client Connection Saturation Duplicate Certificate DoS

18884 OpenVPN Client Spoofed MAC Address Saturation DoS

18883 OpenVPN OpenSSL Error Queue Crafted Packet DoS

18882 OpenVPN OpenSSL Error Queue Arbitrary Disconnect DoS

Nessus® Vulnerability Scanner

Date Description
2006-05-13 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_1986449a8b7440fab7cc0d8def8aad65.nasl - Type : ACT_GATHER_INFO
2006-05-13 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_5ad3e437e5274514b9ed280b2ca1a8c9.nasl - Type : ACT_GATHER_INFO
2006-05-13 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_a51ad838207748b2a136e888a7db5f8d.nasl - Type : ACT_GATHER_INFO
2006-05-13 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_d1c39c8e05ab4739870f765490fa2052.nasl - Type : ACT_GATHER_INFO
2005-10-11 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-851.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:34:29
  • Multiple Updates