diff options
author | remko <remko@FreeBSD.org> | 2005-08-19 17:58:19 +0800 |
---|---|---|
committer | remko <remko@FreeBSD.org> | 2005-08-19 17:58:19 +0800 |
commit | 18771e35c86ed4e8e7cb64764edc319214d26ecd (patch) | |
tree | aa6e727719409a7edbd9525eac0ebf6606a0e503 /security | |
parent | 875eb7e709e8fa06f5bdcd40c12ad429e22ae72a (diff) | |
download | freebsd-ports-gnome-18771e35c86ed4e8e7cb64764edc319214d26ecd.tar.gz freebsd-ports-gnome-18771e35c86ed4e8e7cb64764edc319214d26ecd.tar.zst freebsd-ports-gnome-18771e35c86ed4e8e7cb64764edc319214d26ecd.zip |
Document four vulnerabilities in openvpn:
* openvpn -- multiple TCP clients connecting with the same certificate at the same time can crash the server
* openvpn -- denial of service: malicious authenticated "tap" client can deplete server virtual memory
* openvpn -- denial of service: undecryptable packet from authorized client can disconnect unrelated clients
* openvpn -- denial of service: client certificate validation can disconnect unrelated clients
Approved by: portsmgr (blanket VuXML)
Submitted by: Matthias Andree <matthias dot andree at gmx dot de>
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 123 |
1 files changed, 123 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b5255b8618ac..01411a0af2ba 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,129 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="5ad3e437-e527-4514-b9ed-280b2ca1a8c9"> + <topic>openvpn -- multiple TCP clients connecting with the same certificate at the same time can crash the server</topic> + <affects> + <package> + <name>openvpn</name> + <range><lt>2.0.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>James Yonan reports:</p> + <blockquote cite="http://openvpn.net/changelog.html"> + <p>If two or more client machines try to connect to the server + at the same time via TCP, using the same client certificate, + and when --duplicate-cn is not enabled on the server, a race + condition can crash the server with "Assertion failed at + mtcp.c:411"</p> + </blockquote> + </body> + </description> + <references> + <cvename>CAN-2005-2534</cvename> + <url>http://openvpn.net/changelog.html</url> + </references> + <dates> + <discovery>2005-08-03</discovery> + <entry>2005-08-19</entry> + </dates> + </vuln> + + <vuln vid="1986449a-8b74-40fa-b7cc-0d8def8aad65"> + <topic>openvpn -- denial of service: malicious authenticated "tap" client can deplete server virtual memory</topic> + <affects> + <package> + <name>openvpn</name> + <range><lt>2.0.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>James Yonan reports:</p> + <blockquote cite="http://openvpn.net/changelog.html"> + <p>A malicious [authenticated] client in "dev tap" + ethernet bridging mode could theoretically flood the server + with packets appearing to come from hundreds of thousands + of different MAC addresses, causing the OpenVPN process to + deplete system virtual memory as it expands its internal + routing table.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CAN-2005-2533</cvename> + <url>http://openvpn.net/changelog.html</url> + </references> + <dates> + <discovery>2005-07-27</discovery> + <entry>2005-08-19</entry> + </dates> + </vuln> + + <vuln vid="d1c39c8e-05ab-4739-870f-765490fa2052"> + <topic>openvpn -- denial of service: undecryptable packet from authorized client can disconnect unrelated clients</topic> + <affects> + <package> + <name>openvpn</name> + <range><lt>2.0.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>James Yonan reports:</p> + <blockquote cite="http://openvpn.net/changelog.html"> + <p>If the client sends a packet which fails to decrypt on the + server, the OpenSSL error queue is not properly flushed, + which can result in another unrelated client instance on the + server seeing the error and responding to it, resulting in + disconnection of the unrelated client.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CAN-2005-2532</cvename> + <url>http://openvpn.net/changelog.html</url> + </references> + <dates> + <discovery>2005-07-27</discovery> + <entry>2005-08-19</entry> + </dates> + </vuln> + + <vuln vid="a51ad838-2077-48b2-a136-e888a7db5f8d"> + <topic>openvpn -- denial of service: client certificate validation can disconnect unrelated clients</topic> + <affects> + <package> + <name>openvpn</name> + <range><lt>2.0.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>James Yonan reports:</p> + <blockquote cite="http://openvpn.net/changelog.html"> + <p>DoS attack against server when run with "verb 0" and + without "tls-auth". If a client connection to the server + fails certificate verification, the OpenSSL error queue is + not properly flushed, which can result in another unrelated + client instance on the server seeing the error and + responding to it, resulting in disconnection of the + unrelated client.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CAN-2005-2531</cvename> + <url>http://openvpn.net/changelog.html</url> + </references> + <dates> + <discovery>2005-08-03</discovery> + <entry>2005-08-19</entry> + </dates> + </vuln> + <vuln vid="5fde5c30-0f4e-11da-bc01-000e0c2e438a"> <topic>tor -- diffie-hellman handshake flaw</topic> <affects> |