First published: Tue Jan 31 2017(Updated: )
OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVPN Monitor | <=2.3.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6329 is considered a medium severity vulnerability due to its potential to expose cleartext data through a birthday attack.
To fix CVE-2016-6329, upgrade OpenVPN to a version later than 2.3.14 and avoid using 64-bit block ciphers like Blowfish in CBC mode.
CVE-2016-6329 allows remote attackers to perform a birthday attack against long-duration encrypted sessions.
CVE-2016-6329 is particularly vulnerable when using Blowfish in CBC mode.
CVE-2016-6329 affects OpenVPN versions up to and including 2.3.14.