{"id":"MGASA-2017-0224","summary":"Updated openvpn packages fix security vulnerabilities","details":"It was possible to trigger an assertion by sending a malformed IPv6\npacket. That issue could have been abused to remotely shutdown an\nopenvpn server or client, if IPv6 and --mssfix were enabled and if the\nIPv6 networks used inside the VPN were known (CVE-2017-7508).\n\nSome parts of the certificate-parsing code did not always clear all\nallocated memory. This would have allowed clients to leak a few bytes of\nmemory for each connection attempt, thereby facilitating a (quite\ninefficient) DoS attack on the server (CVE-2017-7512).\n\nIf clients used a HTTP proxy with NTLM authentication, a\nman-in-the-middle attacker between client and proxy could cause the\nclient to crash or disclose at most 96 bytes of stack memory. The\ndisclosed stack memory was likely to contain the proxy password. If the\nproxy password had not been reused, this was unlikely to compromise the\nsecurity of the OpenVPN tunnel itself. Clients who did not use the\n--http-proxy option with ntlm2 authentication were not affected\n(CVE-2017-7520).\n\nThe ASN1 parsing code contained a bug that could have resulted in some\nbuffers being free()d twice, and this issue could have potentially been\ntriggered remotely by a VPN peer (CVE-2017-7521).\n","modified":"2026-01-30T09:26:14.895739Z","published":"2017-07-28T18:12:15Z","related":["CVE-2017-7508","CVE-2017-7512","CVE-2017-7520","CVE-2017-7521"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0224.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=21125"},{"type":"REPORT","url":"https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243"},{"type":"REPORT","url":"https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00027.html"},{"type":"REPORT","url":"https://www.ubuntu.com/usn/usn-3339-1/"}],"affected":[{"package":{"name":"openvpn","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/openvpn?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.3.17-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0224.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}