OpenVPN 2.3.x Heartbeat Information Disclosure (Heartbleed)

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.


Synopsis :

An application on the remote host is affected by an information
disclosure vulnerability.

Description :

According to its self-reported version number, the version of OpenVPN
installed on the remote host is affected by an out-of-bounds read
error, known as the 'Heartbleed Bug' in the included OpenSSL version.

This error is related to handling TLS heartbeat extensions that could
allow an attacker to obtain sensitive information such as primary key
material, secondary key material, and other protected content. Note
this affects both client and server modes of operation.

See also :

https://community.openvpn.net/openvpn/wiki/heartbleed
https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn23
http://heartbleed.com/
http://eprint.iacr.org/2014/140
https://www.openssl.org/news/vulnerabilities.html#2014-0160
https://www.openssl.org/news/secadv/20140407.txt

Solution :

Upgrade to 2.3.4 (Installer I001) / 2.3.3 (Installer I002) / 2.3.2
(Installer I004) or later.

Risk factor :

High / CVSS Base Score : 9.4
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N)
CVSS Temporal Score : 7.4
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 73668 ()

Bugtraq ID: 66690

CVE ID: CVE-2014-0160

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now