FreeBSD : OpenVPN -- potential side-channel/timing attack when comparing HMACs (92f30415-9935-11e2-ad4c-080027ef73ec)

Low Nessus Plugin ID 65846


The remote FreeBSD host is missing one or more security-related updates.


The OpenVPN project reports :

OpenVPN 2.3.0 and earlier running in UDP mode are subject to chosen ciphertext injection due to a non-constant-time HMAC comparison function.


Update the affected packages.

See Also

Plugin Details

Severity: Low

ID: 65846

File Name: freebsd_pkg_92f30415993511e2ad4c080027ef73ec.nasl

Version: $Revision: 1.5 $

Type: local

Published: 2013/04/08

Modified: 2013/11/19

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:openvpn, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2013/03/31

Vulnerability Publication Date: 2013/03/19

Reference Information

CVE: CVE-2013-2061