CVE-2020-11810
Summary
| CVE | CVE-2020-11810 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-04-27 15:15:00 UTC |
| Updated | 2023-11-07 03:15:00 UTC |
| Description | An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| #1272 (One client kills other client session via false client floating)
– OpenVPN Community |
CONFIRM |
community.openvpn.net |
Exploit, Vendor Advisory |
| [SECURITY] Fedora 30 Update: openvpn-2.4.9-1.fc30 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| Fix illegal client float (CVE-2020-11810) · OpenVPN/openvpn@37bc691 · GitHub |
CONFIRM |
github.com |
Patch, Third Party Advisory |
| [SECURITY] Fedora 32 Update: openvpn-2.4.9-1.fc32 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
Mailing List, Patch, Third Party Advisory |
| Bug 1169925 – VUL-1: CVE-2020-11810: openvpn: race condition between allocating peer-id and initializing data channel key |
CONFIRM |
bugzilla.suse.com |
Issue Tracking, Third Party Advisory |
| CVE-2020-11810 |
MISC |
security-tracker.debian.org |
Third Party Advisory |
| [SECURITY] Fedora 30 Update: openvpn-2.4.9-1.fc30 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
Mailing List, Patch, Third Party Advisory |
| [SECURITY] [DLA 2992-1] openvpn security update |
MLIST |
lists.debian.org |
|
| [Openvpn-devel,v2] Fix illegal client float - Patchwork |
CONFIRM |
patchwork.openvpn.net |
Patch, Vendor Advisory |
| [SECURITY] Fedora 32 Update: openvpn-2.4.9-1.fc32 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 174999 SUSE Enterprise Linux Security Update for openvpn (SUSE-SU-2021:1577-1)
- 179259 Debian Security Update for Open Virtual Private Network (OpenVPN) (DLA 2992-1)
- 198352 Ubuntu Security Notification for OpenVPN vulnerabilities (USN-4933-1)
- 500504 Alpine Linux Security Update for Open Virtual Private Network (OpenVPN)
- 500572 Alpine Linux Security Update for Open Virtual Private Network (OpenVPN)
- 500771 Alpine Linux Security Update for openvpn
- 501171 Alpine Linux Security Update for openvpn
- 504261 Alpine Linux Security Update for openvpn
- 750210 OpenSUSE Security Update for openvpn (openSUSE-SU-2021:0734-1)