Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:2838-1

Опубликовано: 24 окт. 2017
Источник: suse-cvrf

Описание

Security update for openvpn

This update for openvpn fixes the following security issues:

  • CVE-2017-12166: OpenVPN was vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution. (bsc#1060877).
  • CVE-2016-6329: Now show which ciphers should no longer be used in openvpn --show-ciphers to avoid the SWEET32 attack (bsc#995374)
  • CVE-2017-7478: OpenVPN was vulnerable to unauthenticated Denial of Service of server via received large control packet. (bsc#1038709)
  • CVE-2017-7479: OpenVPN was vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker. (bsc#1038711)
  • Some other hardening fixes have also been applied (bsc#1038713)

Список пакетов

SUSE Linux Enterprise Point of Sale 11 SP3
openvpn-2.0.9-143.47.3.1
openvpn-auth-pam-plugin-2.0.9-143.47.3.1
SUSE Linux Enterprise Server 11 SP3-LTSS
openvpn-2.0.9-143.47.3.1
openvpn-auth-pam-plugin-2.0.9-143.47.3.1
SUSE Linux Enterprise Server 11 SP3-TERADATA
openvpn-2.0.9-143.47.3.1
openvpn-auth-pam-plugin-2.0.9-143.47.3.1
SUSE Linux Enterprise Server 11 SP4
openvpn-2.0.9-143.47.3.1
openvpn-auth-pam-plugin-2.0.9-143.47.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4
openvpn-2.0.9-143.47.3.1
openvpn-auth-pam-plugin-2.0.9-143.47.3.1

Описание

OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:openvpn-2.0.9-143.47.3.1
SUSE Linux Enterprise Point of Sale 11 SP3:openvpn-auth-pam-plugin-2.0.9-143.47.3.1
SUSE Linux Enterprise Server 11 SP3-LTSS:openvpn-2.0.9-143.47.3.1
SUSE Linux Enterprise Server 11 SP3-LTSS:openvpn-auth-pam-plugin-2.0.9-143.47.3.1

Ссылки

Описание

OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:openvpn-2.0.9-143.47.3.1
SUSE Linux Enterprise Point of Sale 11 SP3:openvpn-auth-pam-plugin-2.0.9-143.47.3.1
SUSE Linux Enterprise Server 11 SP3-LTSS:openvpn-2.0.9-143.47.3.1
SUSE Linux Enterprise Server 11 SP3-LTSS:openvpn-auth-pam-plugin-2.0.9-143.47.3.1

Ссылки

Описание

OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:openvpn-2.0.9-143.47.3.1
SUSE Linux Enterprise Point of Sale 11 SP3:openvpn-auth-pam-plugin-2.0.9-143.47.3.1
SUSE Linux Enterprise Server 11 SP3-LTSS:openvpn-2.0.9-143.47.3.1
SUSE Linux Enterprise Server 11 SP3-LTSS:openvpn-auth-pam-plugin-2.0.9-143.47.3.1

Ссылки

Описание

OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:openvpn-2.0.9-143.47.3.1
SUSE Linux Enterprise Point of Sale 11 SP3:openvpn-auth-pam-plugin-2.0.9-143.47.3.1
SUSE Linux Enterprise Server 11 SP3-LTSS:openvpn-2.0.9-143.47.3.1
SUSE Linux Enterprise Server 11 SP3-LTSS:openvpn-auth-pam-plugin-2.0.9-143.47.3.1

Ссылки
Уязвимость SUSE-SU-2017:2838-1