Changes between Version 3 and Version 4 of VulnerabilitiesFixedInOpenSSL1.0.1i


Ignore:
Timestamp:
08/07/14 18:54:42 (10 years ago)
Author:
Steffan Karger
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • VulnerabilitiesFixedInOpenSSL1.0.1i

    v3 v4  
    1313||DTLS memory leak from zero-length fragments||CVE-2014-3507||No. OpenVPN does not use DTLS.||
    1414||OpenSSL DTLS anonymous EC(DH) denial of service||CVE-2014-3510||No. OpenVPN does not use DTLS.||
    15 ||OpenSSL TLS protocol downgrade attack||CVE-2014-3511||No. OpenVPN already defaults to TLS 1.0.||
     15||OpenSSL TLS protocol downgrade attack||CVE-2014-3511||No. OpenVPN already defaults to TLS 1.0 [2].||
    1616||SRP buffer overrun||CVE-2014-3512||No. OpenVPN does not use SRP.||
    1717
    1818[1] This one triggers direct vulnerability in OpenVPN. Stack information is not leaked to the peer. It might be possible that the leaked information is passed on to a client script / plugin (not sure what form the leaked information has, if it's the leaked information is after a NUL-byte, it's probably not exported). Such a plugin/script could then leak the information to the attacker.
     19
     20[2] If you are using OpenVPN 2.3.3 or OpenVPN 2.3.4 and have enabled newer TLS versions by using option tls-version-min in your configuration, your configuration is vulnerable to the protocol downgrade attack. However, it will still be as least as secure as a setup without tls-version-min in its configuration.