CVE-2017-7478
Publication date 11 May 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.
From the Ubuntu Security Team
It was discovered that OpenVPN improperly triggered an assert when receiving an oversized control packet. A remote attacker could use this to cause a denial of service (server or client crash).
Status
Package | Ubuntu Release | Status |
---|---|---|
openvpn | ||
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
Notes
sbeattie
introduced in 3c1b19e04745177185decd14da82c71458442b82 (2.4.0); also was backported to 2.3 in 358f513c008bf01fadb82759ac75ffb8613fc785 (2.3.12)
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3284-1
- OpenVPN vulnerabilities
- 11 May 2017