CVE-2013-2061

The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher.

Published date
2013-11-18T02:55Z
Last modification date
2020-05-12T14:21Z
Assigner
secalert@redhat.com
Problem type
CWE-200
NameURLSourceTags
https://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2eehttps://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2eeCONFIRMExploit, Patch
https://bugzilla.redhat.com/show_bug.cgi?id=960192https://bugzilla.redhat.com/show_bug.cgi?id=960192CONFIRM
[oss-security] 20130506 Re: CVE request: OpenVPN use of non-constant-time memcmp in HMAC comparison in openvpn_decrypthttp://www.openwall.com/lists/oss-security/2013/05/06/6MLIST
openSUSE-SU-2013:1649http://lists.opensuse.org/opensuse-updates/2013-11/msg00016.htmlSUSE
openSUSE-SU-2013:1645http://lists.opensuse.org/opensuse-updates/2013-11/msg00012.htmlSUSEVendor Advisory
https://bugs.gentoo.org/show_bug.cgi?id=468756https://bugs.gentoo.org/show_bug.cgi?id=468756CONFIRM
https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cchttps://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67ccCONFIRM
MDVSA-2013:167http://www.mandriva.com/security/advisories?name=MDVSA-2013:167MANDRIVA
FEDORA-2013-7552http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105568.htmlFEDORA
FEDORA-2013-7531http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105609.htmlFEDORA