CVE-2017-7479
Publication date 11 May 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.
From the Ubuntu Security Team
It was discovered that OpenVPN improperly triggered an assert when packet ids rolled over. An authenticated remote attacker could use this to cause a denial of service (application crash).
Status
Package | Ubuntu Release | Status |
---|---|---|
openvpn | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Fixed 2.3.10-1ubuntu2.1
|
|
14.04 LTS trusty |
Fixed 2.3.2-7ubuntu3.2
|
|
Notes
sbeattie
fix needs a87e1431baccd49a9344cfc63ab7446c4317fa2f (2.4) or 5d747770efa0611cc6cfeb6b3a5853bf51046d53 (2.3) as a prequisite
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3339-1
- OpenVPN vulnerabilities
- 22 June 2017
- USN-3284-1
- OpenVPN vulnerabilities
- 11 May 2017