OpenVPN 2.x < 2.2.3 / 2.3.6 Control Channel Packet Handling DoS

medium Nessus Plugin ID 79746

Synopsis

An application on the remote host is affected by a denial of service vulnerability.

Description

According to its self-reported version number, the version of OpenVPN installed on the remote host is affected by an error related to 'Control Channel Packet' handling and TLS-authenticated clients that could allow denial of service attacks.

Solution

Upgrade to OpenVPN 2.2.3 / 2.3.6 or later.

See Also

http://www.nessus.org/u?5f3c40e7

http://www.nessus.org/u?30efbb49

http://www.nessus.org/u?6534e9a2

Plugin Details

Severity: Medium

ID: 79746

File Name: openvpn_2_3_6.nasl

Version: 1.3

Type: local

Agent: windows

Family: Windows

Published: 12/5/2014

Updated: 11/25/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/a:openvpn:openvpn

Required KB Items: installed_sw/OpenVPN

Exploit Ease: No known exploits are available

Patch Publication Date: 12/1/2014

Vulnerability Publication Date: 12/1/2014

Reference Information

CVE: CVE-2014-8104

BID: 71402