Mandriva Linux Security Advisory : openvpn (MDVSA-2013:167)

low Nessus Plugin ID 66614


The remote Mandriva Linux host is missing a security update.


Updated openvpn package fixes security vulnerability :

OpenVPN 2.3.0 and earlier running in UDP mode are subject to chosen ciphertext injection due to a non-constant-time HMAC comparison function. Plaintext recovery may be possible using a padding oracle attack on the CBC mode cipher implementation of the crypto library, optimistically at a rate of about one character per 3 hours. PolarSSL seems vulnerable to such an attack; the vulnerability of OpenSSL has not been verified or tested (CVE-2013-2061).


Update the affected openvpn package.

Plugin Details

Severity: Low

ID: 66614

File Name: mandriva_MDVSA-2013-167.nasl

Version: 1.9

Type: local

Published: 5/28/2013

Updated: 1/6/2021

Risk Information


Risk Factor: Low

Score: 2.2


Risk Factor: Low

Base Score: 2.6

Temporal Score: 2.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:openvpn, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/Mandrake/rpm-list, Host/cpu, Host/Mandrake/release

Exploit Ease: No known exploits are available

Patch Publication Date: 5/27/2013

Reference Information

CVE: CVE-2013-2061

BID: 59672

MDVSA: 2013:167

MGASA: 2013-0153