FreeBSD : openvpn -- denial of service: malicious authenticated 'tap' client can deplete server virtual memory (1986449a-8b74-40fa-b7cc-0d8def8aad65)

low Nessus Plugin ID 21391

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

James Yonan reports :

A malicious [authenticated] client in 'dev tap' ethernet bridging mode could theoretically flood the server with packets appearing to come from hundreds of thousands of different MAC addresses, causing the OpenVPN process to deplete system virtual memory as it expands its internal routing table.

Solution

Update the affected package.

See Also

https://openvpn.net/community-resources/changelog-for-openvpn-2-1/

http://www.nessus.org/u?fe894acb

Plugin Details

Severity: Low

ID: 21391

File Name: freebsd_pkg_1986449a8b7440fab7cc0d8def8aad65.nasl

Version: 1.15

Type: local

Published: 5/13/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.5

CVSS v2

Risk Factor: Low

Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:openvpn, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 8/19/2005

Vulnerability Publication Date: 7/27/2005

Reference Information

CVE: CVE-2005-2533