ALT-PU-2017-1607-1
Closed vulnerabilities
BDU:2019-04216
Уязвимость программного обеспечения OpenVPN, связанная с проблемами использования шифрования с 64-битным блоком, позволяющая нарушителю восстановить исходное сообщение
Modified: 2024-11-21
CVE-2016-6329
OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
- 92631
- 92631
- 1036695
- 1036695
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
- http://www-01.ibm.com/support/docview.wss?uid=swg21991482
- http://www-01.ibm.com/support/docview.wss?uid=swg21991482
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
- https://community.openvpn.net/openvpn/wiki/SWEET32
- https://community.openvpn.net/openvpn/wiki/SWEET32
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
- GLSA-201611-02
- GLSA-201611-02
- https://sweet32.info/
- https://sweet32.info/
Modified: 2024-11-21
CVE-2017-7478
OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.
Modified: 2024-11-21
CVE-2017-7479
OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.
Closed bugs
Хорошо бы паковать openvpn-plugin.h
Отсутствует /var/run/openvpn
Broken systemd integration
Проблема openvpn 2.3.12 при подключении через static key