Changes between Version 3 and Version 4 of VulnerabilitiesFixedInOpenSSL1.0.1i
- Timestamp:
- 08/07/14 18:54:42 (10 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
VulnerabilitiesFixedInOpenSSL1.0.1i
v3 v4 13 13 ||DTLS memory leak from zero-length fragments||CVE-2014-3507||No. OpenVPN does not use DTLS.|| 14 14 ||OpenSSL DTLS anonymous EC(DH) denial of service||CVE-2014-3510||No. OpenVPN does not use DTLS.|| 15 ||OpenSSL TLS protocol downgrade attack||CVE-2014-3511||No. OpenVPN already defaults to TLS 1.0 .||15 ||OpenSSL TLS protocol downgrade attack||CVE-2014-3511||No. OpenVPN already defaults to TLS 1.0 [2].|| 16 16 ||SRP buffer overrun||CVE-2014-3512||No. OpenVPN does not use SRP.|| 17 17 18 18 [1] This one triggers direct vulnerability in OpenVPN. Stack information is not leaked to the peer. It might be possible that the leaked information is passed on to a client script / plugin (not sure what form the leaked information has, if it's the leaked information is after a NUL-byte, it's probably not exported). Such a plugin/script could then leak the information to the attacker. 19 20 [2] If you are using OpenVPN 2.3.3 or OpenVPN 2.3.4 and have enabled newer TLS versions by using option tls-version-min in your configuration, your configuration is vulnerable to the protocol downgrade attack. However, it will still be as least as secure as a setup without tls-version-min in its configuration.