FreeBSD : OpenVPN -- two remote denial-of-service vulnerabilities (04cc7bd2-3686-11e7-aa64-080027ef73ec)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

Samuli Seppanen reports :

OpenVPN v2.4.0 was audited for security vulnerabilities independently
by Quarkslabs (funded by OSTIF) and Cryptography Engineering (funded
by Private Internet Access) between December 2016 and April 2017. The
primary findings were two remote denial-of-service vulnerabilities.
Fixes to them have been backported to v2.3.15.

An authenticated client can do the 'three way handshake'
the first that is allowed to carry payload. If that payload is too
big, the OpenVPN server process will stop running due to an ASSERT()
exception. That is also the reason why servers using
tls-auth/tls-crypt are protected against this attack - the P_CONTROL
packet is only accepted if it contains the session ID we specified,
with a valid HMAC (challenge-response). (CVE-2017-7478)

An authenticated client can cause the server's the packet-id counter
to roll over, which would lead the server process to hit an ASSERT()
and stop running. To make the server hit the ASSERT(), the client must
first cause the server to send it 2^32 packets (at least 196 GB).

See also :

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 100140 ()

Bugtraq ID:

CVE ID: CVE-2017-7478

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now