Vulnerability CVE-2013-2061


Published: 2013-11-17   Modified: 2013-11-18

Description:
The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
OpenVPN HMAC non-constant-time comparison in openvpn_decrypt
Vincent Danen
06.05.2013

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:N/AC:H/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.6/10
2.9/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Openvpn -> Openvpn 
Opensuse -> Opensuse 
Novell -> Opensuse 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105568.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105609.html
http://lists.opensuse.org/opensuse-updates/2013-11/msg00012.html
http://lists.opensuse.org/opensuse-updates/2013-11/msg00016.html
http://www.mandriva.com/security/advisories?name=MDVSA-2013:167
http://www.openwall.com/lists/oss-security/2013/05/06/6
https://bugs.gentoo.org/show_bug.cgi?id=468756
https://bugzilla.redhat.com/show_bug.cgi?id=960192
https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc
https://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2ee

Copyright 2024, cxsecurity.com

 

Back to Top