First published: Tue Jun 27 2017(Updated: )
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service by authenticated remote attacker via sending a certificate with an embedded NULL character.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVPN Monitor | <=2.3.16 | |
OpenVPN Monitor | =2.4.0 | |
OpenVPN Monitor | =2.4.0-alpha2 | |
OpenVPN Monitor | =2.4.0-beta1 | |
OpenVPN Monitor | =2.4.0-beta2 | |
OpenVPN Monitor | =2.4.0-rc1 | |
OpenVPN Monitor | =2.4.0-rc2 | |
OpenVPN Monitor | =2.4.1 | |
OpenVPN Monitor | =2.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7522 is classified as a denial-of-service vulnerability affecting older versions of OpenVPN.
To fix CVE-2017-7522, upgrade OpenVPN to version 2.4.3 or later.
CVE-2017-7522 affects OpenVPN versions prior to 2.4.3 and 2.3.17.
Yes, CVE-2017-7522 can be exploited by an authenticated remote attacker.
CVE-2017-7522 allows for denial-of-service attacks by sending specially crafted certificates.