Mandriva Linux Security Advisory : openvpn (MDVSA-2013:167)

Low Nessus Plugin ID 66614


The remote Mandriva Linux host is missing a security update.


Updated openvpn package fixes security vulnerability :

OpenVPN 2.3.0 and earlier running in UDP mode are subject to chosen ciphertext injection due to a non-constant-time HMAC comparison function. Plaintext recovery may be possible using a padding oracle attack on the CBC mode cipher implementation of the crypto library, optimistically at a rate of about one character per 3 hours. PolarSSL seems vulnerable to such an attack; the vulnerability of OpenSSL has not been verified or tested (CVE-2013-2061).


Update the affected openvpn package.

Plugin Details

Severity: Low

ID: 66614

File Name: mandriva_MDVSA-2013-167.nasl

Version: $Revision: 1.6 $

Type: local

Published: 2013/05/28

Modified: 2013/11/25

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 2.6

Temporal Score: 2.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:openvpn, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/05/27

Reference Information

CVE: CVE-2013-2061

BID: 59672

MDVSA: 2013:167

MGASA: 2013-0153