FreeBSD : openvpn -- denial of service: undecryptable packet from authorized client can disconnect unrelated clients (d1c39c8e-05ab-4739-870f-765490fa2052)

medium Nessus Plugin ID 21513

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

James Yonan reports :

If the client sends a packet which fails to decrypt on the server, the OpenSSL error queue is not properly flushed, which can result in another unrelated client instance on the server seeing the error and responding to it, resulting in disconnection of the unrelated client.

Solution

Update the affected package.

See Also

https://openvpn.net/community-resources/changelog-for-openvpn-2-1/

http://www.nessus.org/u?5f3d86a9

Plugin Details

Severity: Medium

ID: 21513

File Name: freebsd_pkg_d1c39c8e05ab4739870f765490fa2052.nasl

Version: 1.14

Type: local

Published: 5/13/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:openvpn, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 8/19/2005

Vulnerability Publication Date: 7/27/2005

Reference Information

CVE: CVE-2005-2532