Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 16 Apr 2020 09:32:25 +0000 (UTC)
From:      Matthias Andree <mandree@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r531833 - head/security/vuxml
Message-ID:  <202004160932.03G9WPeT092632@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: mandree
Date: Thu Apr 16 09:32:25 2020
New Revision: 531833
URL: https://svnweb.freebsd.org/changeset/ports/531833

Log:
  document security/openvpn{,-mbedtls,-devel} illegal client float DoS
  
  URL:		https://community.openvpn.net/openvpn/ticket/1272
  
  Reported by:	Lev Stipakov
  Security:	CVE-2020-11810
  Security:	8604121c-7fc2-11ea-bcac-7781e90b0c8f

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Apr 16 09:16:53 2020	(r531832)
+++ head/security/vuxml/vuln.xml	Thu Apr 16 09:32:25 2020	(r531833)
@@ -58,6 +58,55 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="8604121c-7fc2-11ea-bcac-7781e90b0c8f">
+    <topic>openvpn -- illegal client float can break VPN session for other users</topic>
+    <affects>
+      <package>
+	<name>openvpn</name>
+	<range><lt>2.4.8_3</lt></range>
+      </package>
+      <package>
+	<name>openvpn-mbedtls</name>
+	<range><lt>2.4.8_3</lt></range>
+      </package>
+      <package>
+	<name>openvpn-devel</name>
+	<range><lt>202016</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Lev Stipakov and Gert Doering report:</p>
+	<blockquote cite="https://github.com/OpenVPN/openvpn/commit/f7b318f811bb43c0d3aa7f337ec6242ed2c33881">;
+	  <p>There is a time frame between allocating peer-id and initializing data
+	    channel key (which is performed on receiving push request or on async
+	    push-reply) in which the existing peer-id float checks do not work right.</p>
+	  <p>If a "rogue" data channel packet arrives during that time frame from
+	    another address and with same peer-id, this would cause client to float
+	    to that new address.</p>
+	  <p>The net effect of this behaviour is that the VPN session for the
+	    "victim client" is broken. Since the "attacker client" does not have
+	    suitable keys, it can not inject or steal VPN traffic from the other
+	    session. The time window is small and it can not be used to attack
+	    a specific client's session, unless some other way is found to make it
+	    disconnect and reconnect first.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://github.com/OpenVPN/openvpn/commit/f7b318f811bb43c0d3aa7f337ec6242ed2c33881</url>;
+      <url>https://sourceforge.net/p/openvpn/openvpn/ci/f7b318f811bb43c0d3aa7f337ec6242ed2c33881/</url>;
+      <url>https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg19720.html</url>;
+      <url>https://community.openvpn.net/openvpn/ticket/1272</url>;
+      <url>https://patchwork.openvpn.net/patch/1077/</url>;
+      <cvename>CVE-2020-11810</cvename>
+    </references>
+    <dates>
+      <discovery>2020-04-13</discovery>
+      <entry>2020-04-16</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="bf1f47c4-7f1b-11ea-bf94-001cc0382b2f">
     <topic>Mbed TLS -- Side channel attack on ECDSA</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202004160932.03G9WPeT092632>