svn commit: r531833 - head/security/vuxml
Matthias Andree
mandree at FreeBSD.org
Thu Apr 16 09:32:26 UTC 2020
Author: mandree
Date: Thu Apr 16 09:32:25 2020
New Revision: 531833
URL: https://svnweb.freebsd.org/changeset/ports/531833
Log:
document security/openvpn{,-mbedtls,-devel} illegal client float DoS
URL: https://community.openvpn.net/openvpn/ticket/1272
Reported by: Lev Stipakov
Security: CVE-2020-11810
Security: 8604121c-7fc2-11ea-bcac-7781e90b0c8f
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Apr 16 09:16:53 2020 (r531832)
+++ head/security/vuxml/vuln.xml Thu Apr 16 09:32:25 2020 (r531833)
@@ -58,6 +58,55 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="8604121c-7fc2-11ea-bcac-7781e90b0c8f">
+ <topic>openvpn -- illegal client float can break VPN session for other users</topic>
+ <affects>
+ <package>
+ <name>openvpn</name>
+ <range><lt>2.4.8_3</lt></range>
+ </package>
+ <package>
+ <name>openvpn-mbedtls</name>
+ <range><lt>2.4.8_3</lt></range>
+ </package>
+ <package>
+ <name>openvpn-devel</name>
+ <range><lt>202016</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Lev Stipakov and Gert Doering report:</p>
+ <blockquote cite="https://github.com/OpenVPN/openvpn/commit/f7b318f811bb43c0d3aa7f337ec6242ed2c33881">
+ <p>There is a time frame between allocating peer-id and initializing data
+ channel key (which is performed on receiving push request or on async
+ push-reply) in which the existing peer-id float checks do not work right.</p>
+ <p>If a "rogue" data channel packet arrives during that time frame from
+ another address and with same peer-id, this would cause client to float
+ to that new address.</p>
+ <p>The net effect of this behaviour is that the VPN session for the
+ "victim client" is broken. Since the "attacker client" does not have
+ suitable keys, it can not inject or steal VPN traffic from the other
+ session. The time window is small and it can not be used to attack
+ a specific client's session, unless some other way is found to make it
+ disconnect and reconnect first.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/OpenVPN/openvpn/commit/f7b318f811bb43c0d3aa7f337ec6242ed2c33881</url>
+ <url>https://sourceforge.net/p/openvpn/openvpn/ci/f7b318f811bb43c0d3aa7f337ec6242ed2c33881/</url>
+ <url>https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg19720.html</url>
+ <url>https://community.openvpn.net/openvpn/ticket/1272</url>
+ <url>https://patchwork.openvpn.net/patch/1077/</url>
+ <cvename>CVE-2020-11810</cvename>
+ </references>
+ <dates>
+ <discovery>2020-04-13</discovery>
+ <entry>2020-04-16</entry>
+ </dates>
+ </vuln>
+
<vuln vid="bf1f47c4-7f1b-11ea-bf94-001cc0382b2f">
<topic>Mbed TLS -- Side channel attack on ECDSA</topic>
<affects>
More information about the svn-ports-head
mailing list