Lucene search

K
gentooGentoo FoundationGLSA-202105-25
HistoryMay 26, 2021 - 12:00 a.m.

OpenVPN: Authentication bypass

2021-05-2600:00:00
Gentoo Foundation
security.gentoo.org
109
openvpn
ssl vpn
authentication bypass
information leaks
security
upgrade

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.029

Percentile

90.8%

Background

OpenVPN is a multi-platform, full-featured SSL VPN solution.

Description

It was discovered that OpenVPN incorrectly handled deferred authentication.

Impact

A remote attacker could bypass authentication and access control channel data and trigger further information leaks.

Workaround

Configure OpenVPN server to not use deferred authentication.

Resolution

All OpenVPN users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-vpn/openvpn-2.5.2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-vpn/openvpn< 2.5.2UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.029

Percentile

90.8%