SB2017062133 - Fedora 26 update for openvpn
Published: June 21, 2017 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2017-7508)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due assertion failure when processing IPv6 packets. A remote attacker can send a specially crafted IPv6 packet and perform a denial of service (DoS) attack.
2) MitM attack (CVE-ID: CVE-2017-7520)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack or obtain potentially sensitive client's information.
If clients use a HTTP proxy with NTLM authentication (i.e. "--http-proxy <server> <port> [<authfile>|'auto'|'auto-nct'] ntlm2"), a man-in-the-middle attacker between the client and the proxy can cause the client to crash or disclose at most 96 bytes of stack memory. The disclosed stack memory is likely to contain the proxy password.
3) Double free error (CVE-ID: CVE-2017-7521)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to double free error when processing --x509-alt-username attribute. A remote unauthenticated attacker can trigger double free error and crash the affected server or potentially execute arbitrary code.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
4) Improper input validation (CVE-ID: CVE-2017-7522)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to an error when processing --x509-track attribute within mbedtls. A remote authenticated attacker can perform denial of service (DoS) attack.
Remediation
Install update from vendor's website.