[arch-security] [ASA-201512-19] openvpn: out-of-bound read
Remi Gacogne
rgacogne at archlinux.org
Mon Dec 28 19:09:38 UTC 2015
Arch Linux Security Advisory ASA-201512-19
==========================================
Severity: Low
Date : 2015-12-28
CVE-ID : N/A
Package : openvpn
Type : out-of-bound error
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package openvpn before version 2.3.9-1 is vulnerable to an
out-of-bound read.
Resolution
==========
Upgrade to 2.3.9-1.
# pacman -Syu "openvpn>=2.3.9-1"
The problem has been fixed upstream in version 2.3.9.
Workaround
==========
None.
Description
===========
The code always tried to copy-out a "struct sockaddr_in6" even for IPv4
results, which reads more bytes than getaddrinfo() is guaranteed to
allocate.
Impact
======
A remote attacker might be able to cause a denial of service
(application crash) or access sensitive data.
References
==========
https://bugs.archlinux.org/task/47498
http://seclists.org/oss-sec/2015/q4/535
https://blog.fuzzing-project.org/32-Out-of-bounds-read-in-OpenVPN.html
http://permalink.gmane.org/gmane.network.openvpn.devel/10479
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20151228/ee16c41f/attachment.asc>
More information about the arch-security
mailing list