Описание
OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
Релиз | Статус | Примечание |
---|---|---|
artful | not-affected | 2.4.0-4ubuntu1 |
bionic | not-affected | 2.4.0-4ubuntu1 |
cosmic | not-affected | 2.4.0-4ubuntu1 |
devel | not-affected | 2.4.0-4ubuntu1 |
disco | not-affected | 2.4.0-4ubuntu1 |
eoan | not-affected | 2.4.0-4ubuntu1 |
esm-infra-legacy/trusty | not-affected | 2.3.2-7ubuntu3.2 |
esm-infra/bionic | not-affected | 2.4.0-4ubuntu1 |
esm-infra/focal | not-affected | 2.4.0-4ubuntu1 |
esm-infra/xenial | not-affected | 2.3.10-1ubuntu2.1 |
Показывать по
EPSS
4.3 Medium
CVSS2
5.9 Medium
CVSS3
Связанные уязвимости
OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
OpenVPN, when using a 64-bit block cipher, makes it easier for remote ...
OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
Уязвимость программного обеспечения OpenVPN, связанная с проблемами использования шифрования с 64-битным блоком, позволяющая нарушителю восстановить исходное сообщение
EPSS
4.3 Medium
CVSS2
5.9 Medium
CVSS3