Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Debian Local Security Checks --> Category: infos

[DSA851] DSA-851-1 openvpn Vulnerability Scan

Vulnerability Scan Summary
DSA-851-1 openvpn

Detailed Explanation for this Vulnerability Test

Several security related problems have been discovered in openvpn, a
Virtual Private Network daemon. The Common Vulnerabilities and
Exposures project identifies the following problems:
Wrong processing of failed certificate authentication when running
with "verb 0" and without TLS authentication can lead to a denial
of service by disconnecting the wrong client.
Wrong handling of packets that can't be decrypted on the server
can lead to the disconnection of unrelated clients.
When running in "dev tap" Ethernet bridging mode, openvpn can
exhaust its memory by receiving a large number of spoofed MAC
addresses and hence denying service.
Simultaneous TCP connections from multiple clients with the same
client certificate can cause a denial of service when
--duplicate-cn is not enabled.
The old stable distribution (woody) does not contain openvpn packages.
For the stable distribution (sarge) these problems have been fixed in
version 2.0-1sarge1.
For the unstable distribution (sid) these problems have been fixed in
version 2.0.2-1.
We recommend that you upgrade your openvpn package.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.