First published: Mon May 15 2017(Updated: )
OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVPN OpenVPN | =2.3.12 | |
OpenVPN OpenVPN | =2.3.13 | |
OpenVPN OpenVPN | =2.3.14 | |
OpenVPN OpenVPN | =2.4.0 | |
OpenVPN OpenVPN | =2.4.0-alpha2 | |
OpenVPN OpenVPN | =2.4.0-beta1 | |
OpenVPN OpenVPN | =2.4.0-beta2 | |
OpenVPN OpenVPN | =2.4.0-rc1 | |
OpenVPN OpenVPN | =2.4.0-rc2 | |
OpenVPN OpenVPN | =2.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7478 is categorized as a medium severity vulnerability due to the risk of Denial of Service attacks.
To fix CVE-2017-7478, upgrade to OpenVPN version 2.3.15 or 2.4.2 or later.
OpenVPN versions 2.3.12 to 2.4.1, including 2.3.13, 2.3.14, and various 2.4.0 pre-release versions, are affected by CVE-2017-7478.
CVE-2017-7478 can lead to an unauthenticated Denial of Service on the OpenVPN server.
As of the information available, there are no publicly disclosed exploits for CVE-2017-7478.