ALT-PU-2017-2344-1
Closed vulnerabilities
BDU:2018-00021
Уязвимость пакета OpenVPN, существующая из-за неправильной обработки клиентских подключений к HTTP-прокси, позволяющая нарушителю выполнить произвольный код
BDU:2019-04216
Уязвимость программного обеспечения OpenVPN, связанная с проблемами использования шифрования с 64-битным блоком, позволяющая нарушителю восстановить исходное сообщение
Modified: 2025-04-20
CVE-2016-6329
OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
- http://www-01.ibm.com/support/docview.wss?uid=swg21991482
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.securityfocus.com/bid/92631
- http://www.securitytracker.com/id/1036695
- https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
- https://community.openvpn.net/openvpn/wiki/SWEET32
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
- https://security.gentoo.org/glsa/201611-02
- https://sweet32.info/
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
- http://www-01.ibm.com/support/docview.wss?uid=swg21991482
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.securityfocus.com/bid/92631
- http://www.securitytracker.com/id/1036695
- https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
- https://community.openvpn.net/openvpn/wiki/SWEET32
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
- https://security.gentoo.org/glsa/201611-02
- https://sweet32.info/
Modified: 2025-04-20
CVE-2017-7478
OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.
- http://www.securityfocus.com/bid/98444
- http://www.securitytracker.com/id/1038473
- https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits
- https://www.exploit-db.com/exploits/41993/
- http://www.securityfocus.com/bid/98444
- http://www.securitytracker.com/id/1038473
- https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits
- https://www.exploit-db.com/exploits/41993/
Modified: 2025-04-20
CVE-2017-7479
OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.
- http://www.debian.org/security/2017/dsa-3900
- http://www.securityfocus.com/bid/98443
- http://www.securitytracker.com/id/1038473
- https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits
- http://www.debian.org/security/2017/dsa-3900
- http://www.securityfocus.com/bid/98443
- http://www.securitytracker.com/id/1038473
- https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits
Modified: 2025-04-20
CVE-2017-7508
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet.
- http://www.debian.org/security/2017/dsa-3900
- http://www.securityfocus.com/bid/99230
- http://www.securitytracker.com/id/1038768
- https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
- http://www.debian.org/security/2017/dsa-3900
- http://www.securityfocus.com/bid/99230
- http://www.securitytracker.com/id/1038768
- https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
Modified: 2025-04-20
CVE-2017-7520
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker.
- http://www.debian.org/security/2017/dsa-3900
- http://www.securityfocus.com/bid/99230
- http://www.securitytracker.com/id/1038768
- https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
- http://www.debian.org/security/2017/dsa-3900
- http://www.securityfocus.com/bid/99230
- http://www.securitytracker.com/id/1038768
- https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
Modified: 2025-04-20
CVE-2017-7521
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension().
- http://www.debian.org/security/2017/dsa-3900
- http://www.securityfocus.com/bid/99230
- http://www.securitytracker.com/id/1038768
- https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
- http://www.debian.org/security/2017/dsa-3900
- http://www.securityfocus.com/bid/99230
- http://www.securitytracker.com/id/1038768
- https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
Modified: 2025-04-20
CVE-2017-7522
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service by authenticated remote attacker via sending a certificate with an embedded NULL character.
- http://www.securityfocus.com/bid/99230
- http://www.securitytracker.com/id/1038768
- https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
- http://www.securityfocus.com/bid/99230
- http://www.securitytracker.com/id/1038768
- https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
Closed bugs
Проблема openvpn 2.3.12 при подключении через static key