First published: Tue Jun 27 2017(Updated: )
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension().
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVPN OpenVPN | <=2.3.16 | |
OpenVPN OpenVPN | =2.4.0 | |
OpenVPN OpenVPN | =2.4.0-alpha2 | |
OpenVPN OpenVPN | =2.4.0-beta1 | |
OpenVPN OpenVPN | =2.4.0-beta2 | |
OpenVPN OpenVPN | =2.4.0-rc1 | |
OpenVPN OpenVPN | =2.4.0-rc2 | |
OpenVPN OpenVPN | =2.4.1 | |
OpenVPN OpenVPN | =2.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7521 is classified as a remote denial-of-service vulnerability due to memory exhaustion.
To fix CVE-2017-7521, upgrade to OpenVPN version 2.4.3 or later, or 2.3.17 or later.
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to CVE-2017-7521.
Yes, CVE-2017-7521 can be exploited remotely, leading to a denial of service by causing memory exhaustion.
CVE-2017-7521 can cause instability and downtime for OpenVPN services, affecting users' ability to connect.