Two vulnerabilities in OpenVPN



Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2017-7478
CVE-2017-7479
CWE-ID CWE-20
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
OpenVPN for Windows
Client/Desktop applications / Software for system administration

Vendor OpenVPN

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Denial of service

EUVDB-ID: #VU6544

Risk: Medium

CVSSv4.0: 5.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2017-7478

CWE-ID: CWE-20 - Improper input validation

Exploit availability: Yes

Description

The vulnerability allows a remote authenticated attacker to cause DoS conditions on the target system.

The weakness exists due to improper user-input validation. A remote attacker can send a specially crafted P_CONTROL packet and cause the OpenVPN server process to stop running due to an ASSERT() exception.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update to version 2.3.15, 2.4.2 or later.

Vulnerable software versions

OpenVPN for Windows: 2.3.12 - 2.4.1

CPE2.3 External links

https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Denial of service

EUVDB-ID: #VU6545

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2017-7479

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote authenticated attacker to cause DoS conditions on the target system.

The weakness exists due to improper user-input validation. A remote attacker can cause the packet-IDs on the target server to be consumed, trigger the server process to hit an ASSERT() and stop running.

Successful exploitation of the vulnerability of results in denial of service.

Mitigation

Update to version 2.3.15, 2.4.2 or later.

Vulnerable software versions

OpenVPN for Windows: 2.3.12 - 2.4.1

CPE2.3 External links

https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###