First published: Tue Jun 27 2017(Updated: )
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVPN Monitor | <=2.3.16 | |
OpenVPN Monitor | =2.4.0 | |
OpenVPN Monitor | =2.4.0-alpha2 | |
OpenVPN Monitor | =2.4.0-beta1 | |
OpenVPN Monitor | =2.4.0-beta2 | |
OpenVPN Monitor | =2.4.0-rc1 | |
OpenVPN Monitor | =2.4.0-rc2 | |
OpenVPN Monitor | =2.4.1 | |
OpenVPN Monitor | =2.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7508 is classified as a medium severity vulnerability due to its potential for causing remote denial-of-service.
To resolve CVE-2017-7508, upgrade to OpenVPN version 2.4.3 or later if using version 2.4, or version 2.3.17 or later if using version 2.3.
OpenVPN versions before 2.4.3 and before 2.3.17, including various beta and release candidate versions, are affected by CVE-2017-7508.
CVE-2017-7508 enables a remote denial-of-service attack through the receipt of malformed IPv6 packets.
No, using a vulnerable version identified in CVE-2017-7508 puts your OpenVPN configuration at risk of denial-of-service attacks, so it is advised to update immediately.