SB2017062919 - SUSE Linux update for openvpn-openssl1



SB2017062919 - SUSE Linux update for openvpn-openssl1

Published: June 29, 2017 Updated: July 3, 2017

Security Bulletin ID SB2017062919
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 20% Medium 60% Low 20%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Denial of service (CVE-ID: CVE-2017-7478)

The vulnerability allows a remote authenticated attacker to cause DoS conditions on the target system.

The weakness exists due to improper user-input validation. A remote attacker can send a specially crafted P_CONTROL packet and cause the OpenVPN server process to stop running due to an ASSERT() exception.

Successful exploitation of the vulnerability results in denial of service.

2) Denial of service (CVE-ID: CVE-2017-7479)

The vulnerability allows a remote authenticated attacker to cause DoS conditions on the target system.

The weakness exists due to improper user-input validation. A remote attacker can cause the packet-IDs on the target server to be consumed, trigger the server process to hit an ASSERT() and stop running.

Successful exploitation of the vulnerability of results in denial of service.

3) Improper input validation (CVE-ID: CVE-2017-7508)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due assertion failure when processing IPv6 packets. A remote attacker can send a specially crafted IPv6 packet and perform a denial of service (DoS) attack.


4) MitM attack (CVE-ID: CVE-2017-7520)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack or obtain potentially sensitive client's information.

If clients use a HTTP proxy with NTLM authentication (i.e. "--http-proxy <server> <port> [<authfile>|'auto'|'auto-nct'] ntlm2"), a man-in-the-middle attacker between the client and the proxy can cause the client to crash or disclose at most 96 bytes of stack memory. The disclosed stack memory is likely to contain the proxy password.


5) Double free error (CVE-ID: CVE-2017-7521)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to double free error when processing --x509-alt-username attribute. A remote unauthenticated attacker can trigger double free error and crash the affected server or potentially execute arbitrary code.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


Remediation

Install update from vendor's website.