FreeBSD : openvpn -- denial of service: malicious authenticated 'tap' client can deplete server virtual memory (1986449a-8b74-40fa-b7cc-0d8def8aad65)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

James Yonan reports :

A malicious [authenticated] client in 'dev tap' ethernet bridging mode
could theoretically flood the server with packets appearing to come
from hundreds of thousands of different MAC addresses, causing the
OpenVPN process to deplete system virtual memory as it expands its
internal routing table.

See also :

http://openvpn.net/changelog.html
http://www.nessus.org/u?7fc391f7

Solution :

Update the affected package.

Risk factor :

Low / CVSS Base Score : 2.1
(CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21391 (freebsd_pkg_1986449a8b7440fab7cc0d8def8aad65.nasl)

Bugtraq ID:

CVE ID: CVE-2005-2533

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now