FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-19 20:48:44 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
04cc7bd2-3686-11e7-aa64-080027ef73ecOpenVPN -- two remote denial-of-service vulnerabilities

Samuli Seppänen reports:

OpenVPN v2.4.0 was audited for security vulnerabilities independently by Quarkslabs (funded by OSTIF) and Cryptography Engineering (funded by Private Internet Access) between December 2016 and April 2017. The primary findings were two remote denial-of-service vulnerabilities. Fixes to them have been backported to v2.3.15.

An authenticated client can do the 'three way handshake' (P_HARD_RESET, P_HARD_RESET, P_CONTROL), where the P_CONTROL packet is the first that is allowed to carry payload. If that payload is too big, the OpenVPN server process will stop running due to an ASSERT() exception. That is also the reason why servers using tls-auth/tls-crypt are protected against this attack - the P_CONTROL packet is only accepted if it contains the session ID we specified, with a valid HMAC (challenge-response). (CVE-2017-7478)

An authenticated client can cause the server's the packet-id counter to roll over, which would lead the server process to hit an ASSERT() and stop running. To make the server hit the ASSERT(), the client must first cause the server to send it 2^32 packets (at least 196 GB).


Discovery 2017-05-10
Entry 2017-05-11
openvpn
< 2.3.15

ge 2.4.0 lt 2.4.2

openvpn23
< 2.3.15

openvpn-mbedtls
ge 2.4.0 lt 2.4.2

openvpn-polarssl
< 2.3.15

openvpn23-polarssl
< 2.3.15

https://openvpn.net/index.php/open-source/downloads.html
CVE-2017-7478
CVE-2017-7479
https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits
https://ostif.org/?p=870&preview=true
https://www.privateinternetaccess.com/blog/2017/05/openvpn-2-4-2-fixes-critical-issues-discovered-openvpn-audit-reports/
0dc8be9e-19af-11e6-8de0-080027ef73ecOpenVPN -- Buffer overflow in PAM authentication and DoS through port sharing

Samuli Seppänen reports:

OpenVPN 2.3.11 [...] fixes two vulnerabilities: a port-share bug with DoS potential and a buffer overflow by user supplied data when using pam authentication.[...]


Discovery 2016-03-03
Entry 2016-05-14
openvpn
< 2.3.11

openvpn-polarssl
< 2.3.11

https://sourceforge.net/p/openvpn/mailman/message/35076507/
https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn23#OpenVPN2.3.11
1986449a-8b74-40fa-b7cc-0d8def8aad65openvpn -- denial of service: malicious authenticated "tap" client can deplete server virtual memory

James Yonan reports:

A malicious [authenticated] client in "dev tap" ethernet bridging mode could theoretically flood the server with packets appearing to come from hundreds of thousands of different MAC addresses, causing the OpenVPN process to deplete system virtual memory as it expands its internal routing table.


Discovery 2005-07-27
Entry 2005-08-19
openvpn
< 2.0.1

CVE-2005-2533
http://openvpn.net/changelog.html
23ab5c3e-79c3-11e4-8b1e-d050992ecde8OpenVPN -- denial of service security vulnerability

The OpenVPN project reports:

In late November 2014 Dragana Damjanovic notified OpenVPN developers of a critical denial of service security vulnerability (CVE-2014-8104). The vulnerability allows an tls-authenticated client to crash the server by sending a too-short control channel packet to the server. In other words this vulnerability is denial of service only.


Discovery 2014-12-01
Entry 2014-12-02
openvpn
< 2.0.11

ge 2.1.0 lt 2.2.3

ge 2.3.0 lt 2.3.6

CVE-2014-8104
https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b
3dd6ccf4-a3c6-11e7-a52e-0800279f2ff8OpenVPN -- out-of-bounds write in legacy key-method 1

Steffan Karger reports:

The bounds check in read_key() was performed after using the value, instead of before. If 'key-method 1' is used, this allowed an attacker to send a malformed packet to trigger a stack buffer overflow. [...]

Note that 'key-method 1' has been replaced by 'key method 2' as the default in OpenVPN 2.0 (released on 2005-04-17), and explicitly deprecated in 2.4 and marked for removal in 2.5. This should limit the amount of users impacted by this issue.


Discovery 2017-09-21
Entry 2017-09-27
openvpn-polarssl
< 2.3.18

openvpn-mbedtls
ge 2.4.0 lt 2.4.4

openvpn
ge 2.4.0 lt 2.4.4

< 2.3.18

https://community.openvpn.net/openvpn/wiki/CVE-2017-12166
https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg15492.html
CVE-2017-12166
3de49331-0dec-422c-93e5-e4719e9869c5openvpn -- potential denial-of-service on servers in TCP mode

James Yonan reports:

If the TCP server accept() call returns an error status, the resulting exception handler may attempt to indirect through a NULL pointer, causing a segfault. Affects all OpenVPN 2.0 versions.


Discovery 2005-11-01
Entry 2005-11-01
Modified 2005-11-04
openvpn
ge 2.0 lt 2.0.4

CVE-2005-3409
http://openvpn.net/changelog.html
45a72180-a640-11ec-a08b-85298243e224openvpn -- Potential authentication by-pass with multiple deferred authentication plug-ins

David Sommerseth reports:

OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials. This issue is resolved in OpenVPN 2.4.12 and v2.5.6.


Discovery 2022-03-10
Entry 2022-03-17
openvpn
< 2.5.6

openvpn-mbedtls
< 2.5.6

CVE-2022-0547
https://community.openvpn.net/openvpn/wiki/CVE-2022-0547
https://github.com/OpenVPN/openvpn/blob/release/2.5/Changes.rst#overview-of-changes-in-256
5ad3e437-e527-4514-b9ed-280b2ca1a8c9openvpn -- multiple TCP clients connecting with the same certificate at the same time can crash the server

James Yonan reports:

If two or more client machines try to connect to the server at the same time via TCP, using the same client certificate, and when --duplicate-cn is not enabled on the server, a race condition can crash the server with "Assertion failed at mtcp.c:411"


Discovery 2005-08-03
Entry 2005-08-19
openvpn
< 2.0.1

CVE-2005-2534
http://openvpn.net/changelog.html
6129fdc7-6462-456d-a3ef-8fc3fbf44d16openvpn -- arbitrary code execution on client through malicious or compromised server

James Yonan reports:

A format string vulnerability in the foreign_option function in options.c could potentially allow a malicious or compromised server to execute arbitrary code on the client. Only non-Windows clients are affected. The vulnerability only exists if (a) the client's TLS negotiation with the server succeeds, (b) the server is malicious or has been compromised such that it is configured to push a maliciously crafted options string to the client, and (c) the client indicates its willingness to accept pushed options from the server by having "pull" or "client" in its configuration file (Credit: Vade79).


Discovery 2005-10-31
Entry 2005-11-01
Modified 2005-11-04
openvpn
ge 2.0 lt 2.0.4

CVE-2005-3393
http://www.securityfocus.com/archive/1/415293/30/0/threaded
http://openvpn.net/changelog.html
8604121c-7fc2-11ea-bcac-7781e90b0c8fopenvpn -- illegal client float can break VPN session for other users

Lev Stipakov and Gert Doering report:

There is a time frame between allocating peer-id and initializing data channel key (which is performed on receiving push request or on async push-reply) in which the existing peer-id float checks do not work right.

If a "rogue" data channel packet arrives during that time frame from another address and with same peer-id, this would cause client to float to that new address.

The net effect of this behaviour is that the VPN session for the "victim client" is broken. Since the "attacker client" does not have suitable keys, it can not inject or steal VPN traffic from the other session. The time window is small and it can not be used to attack a specific client's session, unless some other way is found to make it disconnect and reconnect first.


Discovery 2020-04-13
Entry 2020-04-16
openvpn
< 2.4.8_3

openvpn-mbedtls
< 2.4.8_3

openvpn-devel
< 202016

https://github.com/OpenVPN/openvpn/commit/f7b318f811bb43c0d3aa7f337ec6242ed2c33881
https://sourceforge.net/p/openvpn/openvpn/ci/f7b318f811bb43c0d3aa7f337ec6242ed2c33881/
https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg19720.html
https://community.openvpn.net/openvpn/ticket/1272
https://patchwork.openvpn.net/patch/1077/
CVE-2020-11810
92f30415-9935-11e2-ad4c-080027ef73ecOpenVPN -- potential side-channel/timing attack when comparing HMACs

The OpenVPN project reports:

OpenVPN 2.3.0 and earlier running in UDP mode are subject to chosen ciphertext injection due to a non-constant-time HMAC comparison function.


Discovery 2013-03-19
Entry 2013-03-31
Modified 2013-06-01
openvpn
< 2.0.9_4

ge 2.1.0 lt 2.2.2_2

ge 2.3.0 lt 2.3.1

https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc
CVE-2013-2061
http://www.openwall.com/lists/oss-security/2013/05/06/6
https://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2ee
9f65d382-56a4-11e7-83e3-080027ef73ecOpenVPN -- several vulnerabilities

Samuli Seppänen reports:

In May/June 2017 Guido Vranken threw a fuzzer at OpenVPN 2.4.2. In the process he found several vulnerabilities and reported them to the OpenVPN project. [...] The first releases to have these fixes are OpenVPN 2.4.3 and 2.3.17.

This is a list of fixed important vulnerabilities:

  • Remotely-triggerable ASSERT() on malformed IPv6 packet
  • Pre-authentication remote crash/information disclosure for clients
  • Potential double-free in --x509-alt-username
  • Remote-triggerable memory leaks
  • Post-authentication remote DoS when using the --x509-track option
  • Null-pointer dereference in establish_http_proxy_passthru()

Discovery 2017-05-19
Entry 2017-06-21
openvpn
< 2.3.17

ge 2.4.0 lt 2.4.3

openvpn-mbedtls
< 2.4.3

openvpn-polarssl
< 2.3.17

CVE-2017-7520
https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
CVE-2017-7508
CVE-2017-7512
CVE-2017-7521
CVE-2017-7522
a51ad838-2077-48b2-a136-e888a7db5f8dopenvpn -- denial of service: client certificate validation can disconnect unrelated clients

James Yonan reports:

DoS attack against server when run with "verb 0" and without "tls-auth". If a client connection to the server fails certificate verification, the OpenSSL error queue is not properly flushed, which can result in another unrelated client instance on the server seeing the error and responding to it, resulting in disconnection of the unrelated client.


Discovery 2005-08-03
Entry 2005-08-19
openvpn
< 2.0.1

CVE-2005-2531
http://openvpn.net/changelog.html
be4ccb7b-c48b-11da-ae12-0002b3b60e4copenvpn -- LD_PRELOAD code execution on client through malicious or compromised server

Hendrik Weimer reports:

OpenVPN clients are a bit too generous when accepting configuration options from a server. It is possible to transmit environment variables to client-side shell scripts. There are some filters in place to prevent obvious nonsense, however they don't catch the good old LD_PRELOAD trick. All we need is to put a file onto the client under a known location (e.g. by returning a specially crafted document upon web access) and we have a remote root exploit. But since the attack may only come from authenticated servers, this threat is greatly reduced.


Discovery 2006-04-03
Entry 2006-04-05
Modified 2006-04-06
openvpn
ge 2.0 lt 2.0.6

CVE-2006-1629
http://www.osreviews.net/reviews/security/openvpn-print
http://openvpn.net/changelog.html
http://sourceforge.net/mailarchive/message.php?msg_id=15298074
d1c39c8e-05ab-4739-870f-765490fa2052openvpn -- denial of service: undecryptable packet from authorized client can disconnect unrelated clients

James Yonan reports:

If the client sends a packet which fails to decrypt on the server, the OpenSSL error queue is not properly flushed, which can result in another unrelated client instance on the server seeing the error and responding to it, resulting in disconnection of the unrelated client.


Discovery 2005-07-27
Entry 2005-08-19
openvpn
< 2.0.1

CVE-2005-2532
http://openvpn.net/changelog.html
efb965be-a2c0-11eb-8956-1951a8617e30openvpn -- deferred authentication can be bypassed in specific circumstances

Gert Döring reports:

OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.


Discovery 2021-03-02
Entry 2021-04-21
openvpn
< 2.5.2

openvpn-mbedtls
< 2.5.2

https://community.openvpn.net/openvpn/wiki/CVE-2020-15078
https://github.com/OpenVPN/openvpn/blob/release/2.5/Changes.rst#overview-of-changes-in-252
CVE-2020-15078