Mandriva Linux Security Advisory : openvpn (MDVSA-2013:167)

low Nessus Plugin ID 66614

Synopsis

The remote Mandriva Linux host is missing a security update.

Description

Updated openvpn package fixes security vulnerability :

OpenVPN 2.3.0 and earlier running in UDP mode are subject to chosen ciphertext injection due to a non-constant-time HMAC comparison function. Plaintext recovery may be possible using a padding oracle attack on the CBC mode cipher implementation of the crypto library, optimistically at a rate of about one character per 3 hours. PolarSSL seems vulnerable to such an attack; the vulnerability of OpenSSL has not been verified or tested (CVE-2013-2061).

Solution

Update the affected openvpn package.

Plugin Details

Severity: Low

ID: 66614

File Name: mandriva_MDVSA-2013-167.nasl

Version: 1.9

Type: local

Published: 5/28/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 2.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:openvpn, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 5/27/2013

Reference Information

CVE: CVE-2013-2061

BID: 59672

MDVSA: 2013:167

MGASA: 2013-0153