Arch Linux Security Advisory ASA-201412-2
========================================
Severity: High
Date    : 2014-12-02
CVE-ID  : CVE-2014-8104
Package : openvpn
Type    : denial of service
Remote  : Yes
Link    : https://wiki.archlinux.org/title/CVE-2014

Summary
======
The package openvpn before version 2.3.6-1 is vulnerable to denial of
service.

Resolution
=========
Upgrade to 2.3.6-1.

# pacman -Syu "openvpn>=2.3.6-1"

The problem has been fixed upstream [0] in version 2.3.6.

Workaround
=========
None.

Description
==========
It was discovered that an authenticated client could trigger an ASSERT()
in OpenVPN by sending a too-short control channel packet to the server.
This could cause the OpenVPN server to crash and deny access to the VPN
to other legitimate users.

Impact
=====
A remote authenticated attacker could send specially crafted packets
that could cause the OpenVPN server to crash leading to denial of
service of other legitimate users.

References
=========
[0] https://github.com/OpenVPN/openvpn/commit/c5590a
https://access.redhat.com/security/cve/CVE-2014-8104
https://bugs.archlinux.org/task/42975

ArchLinux: 201412-2: openvpn: denial of service

December 2, 2014

Summary

It was discovered that an authenticated client could trigger an ASSERT() in OpenVPN by sending a too-short control channel packet to the server. This could cause the OpenVPN server to crash and deny access to the VPN to other legitimate users.

Resolution

Upgrade to 2.3.6-1. # pacman -Syu "openvpn>=2.3.6-1"
The problem has been fixed upstream [0] in version 2.3.6.

References

[0] https://github.com/OpenVPN/openvpn/commit/c5590a https://access.redhat.com/security/cve/CVE-2014-8104 https://bugs.archlinux.org/task/42975

Severity
Package : openvpn
Type : denial of service
Remote : Yes
Link : https://wiki.archlinux.org/title/CVE-2014

Workaround

None.

Related News