[arch-security] [ASA-201512-19] openvpn: out-of-bound read

Remi Gacogne rgacogne at archlinux.org
Mon Dec 28 19:09:38 UTC 2015


Arch Linux Security Advisory ASA-201512-19
==========================================

Severity: Low
Date    : 2015-12-28
CVE-ID  : N/A
Package : openvpn
Type    : out-of-bound error
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package openvpn before version 2.3.9-1 is vulnerable to an
out-of-bound read.

Resolution
==========

Upgrade to 2.3.9-1.

# pacman -Syu "openvpn>=2.3.9-1"

The problem has been fixed upstream in version 2.3.9.

Workaround
==========

None.

Description
===========

The code always tried to copy-out a "struct sockaddr_in6" even for IPv4
results, which reads more bytes than getaddrinfo() is guaranteed to
allocate.

Impact
======

A remote attacker might be able to cause a denial of service
(application crash) or access sensitive data.

References
==========

https://bugs.archlinux.org/task/47498
http://seclists.org/oss-sec/2015/q4/535
https://blog.fuzzing-project.org/32-Out-of-bounds-read-in-OpenVPN.html
http://permalink.gmane.org/gmane.network.openvpn.devel/10479

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20151228/ee16c41f/attachment.asc>


More information about the arch-security mailing list