OpenVPN Client Remote Code Execution Vulnerability
BID:17392
Info
OpenVPN Client Remote Code Execution Vulnerability
| Bugtraq ID: | 17392 |
| Class: | Input Validation Error |
| CVE: |
CVE-2006-1629 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 06 2006 12:00AM |
| Updated: | Dec 05 2006 08:14PM |
| Credit: | Discovery is credited to Hendrik Weimer. |
| Vulnerable: |
S.u.S.E. Linux Professional 10.0 OSS S.u.S.E. Linux Professional 10.0 S.u.S.E. Linux Professional 9.3 x86_64 S.u.S.E. Linux Professional 9.3 S.u.S.E. Linux Personal 10.0 OSS S.u.S.E. Linux Personal 9.3 x86_64 S.u.S.E. Linux Personal 9.3 OpenVPN OpenVPN 2.0.5 OpenVPN OpenVPN 2.0.4 OpenVPN OpenVPN 2.0.3 OpenVPN OpenVPN 2.0.2 OpenVPN OpenVPN 2.0.1 OpenVPN OpenVPN 2.0 Mandriva Linux Mandrake 2006.0 x86_64 Mandriva Linux Mandrake 2006.0 MandrakeSoft Multi Network Firewall 2.0 Debian Linux 3.1 sparc Debian Linux 3.1 s/390 Debian Linux 3.1 ppc Debian Linux 3.1 mipsel Debian Linux 3.1 mips Debian Linux 3.1 m68k Debian Linux 3.1 ia-64 Debian Linux 3.1 ia-32 Debian Linux 3.1 hppa Debian Linux 3.1 arm Debian Linux 3.1 amd64 Debian Linux 3.1 alpha Debian Linux 3.1 |
| Not Vulnerable: |
OpenVPN OpenVPN 2.0.6 |
Discussion
OpenVPN Client Remote Code Execution Vulnerability
OpenVPN is reported prone to a remote code-execution vulnerability. This issue is due to a lack of proper sanitization of server-supplied data.
A remote attacker may exploit this issue to execute arbitrary code with elevated privileges on a vulnerable computer to gain unauthorized access.
To be vulnerable to this issue, client OpenVPN computers must be configured to use 'up' or 'down' scripts and must have either the 'pull' configuration directive or a 'client' macro set up.
OpenVPN versions 2.0.0 through 2.0.5 are affected by this issue.
OpenVPN is reported prone to a remote code-execution vulnerability. This issue is due to a lack of proper sanitization of server-supplied data.
A remote attacker may exploit this issue to execute arbitrary code with elevated privileges on a vulnerable computer to gain unauthorized access.
To be vulnerable to this issue, client OpenVPN computers must be configured to use 'up' or 'down' scripts and must have either the 'pull' configuration directive or a 'client' macro set up.
OpenVPN versions 2.0.0 through 2.0.5 are affected by this issue.
Exploit / POC
OpenVPN Client Remote Code Execution Vulnerability
An attacker can use the standard OpenVPN server application to exploit this issue.
An attacker can use the standard OpenVPN server application to exploit this issue.
Solution / Fix
OpenVPN Client Remote Code Execution Vulnerability
Solution:
The vendor has released version 2.0.6 of OpenVPN to address this issue.
Please see the references for more information and vendor advisories.
OpenVPN OpenVPN 2.0
OpenVPN OpenVPN 2.0.1
OpenVPN OpenVPN 2.0.2
OpenVPN OpenVPN 2.0.3
OpenVPN OpenVPN 2.0.4
OpenVPN OpenVPN 2.0.5
Solution:
The vendor has released version 2.0.6 of OpenVPN to address this issue.
Please see the references for more information and vendor advisories.
OpenVPN OpenVPN 2.0
-
Debian openvpn_2.0-1sarge3_alpha.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sa rge3_alpha.deb -
Debian openvpn_2.0-1sarge3_amd64.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sa rge3_amd64.deb -
Debian openvpn_2.0-1sarge3_arm.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sa rge3_arm.deb -
Debian openvpn_2.0-1sarge3_hppa.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sa rge3_hppa.deb -
Debian openvpn_2.0-1sarge3_i386.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sa rge3_i386.deb -
Debian openvpn_2.0-1sarge3_ia64.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sa rge3_ia64.deb -
Debian openvpn_2.0-1sarge3_m68k.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sa rge3_m68k.deb -
Debian openvpn_2.0-1sarge3_mips.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sa rge3_mips.deb -
Debian openvpn_2.0-1sarge3_mipsel.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sa rge3_mipsel.deb -
Debian openvpn_2.0-1sarge3_powerpc.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sa rge3_powerpc.deb -
Debian openvpn_2.0-1sarge3_s390.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sa rge3_s390.deb -
Debian openvpn_2.0-1sarge3_sparc.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sa rge3_sparc.deb -
OpenVPN openvpn-2.0.6.tar.gz
http://openvpn.net/release/openvpn-2.0.6.tar.gz
OpenVPN OpenVPN 2.0.1
-
Mandriva openvpn-2.0.1-0.3.M20mdk.i586.rpm
Multi Network Firewall 2.0:
http://wwwnew.mandriva.com/en/downloads/ -
Mandriva openvpn-2.0.1-2.2.20060mdk.i586.rpm
Mandriva Linux 2006.0:
http://wwwnew.mandriva.com/en/downloads/ -
Mandriva openvpn-2.0.1-2.2.20060mdk.x86_64.rpm
Mandriva Linux 2006.0/X86_64:
http://wwwnew.mandriva.com/en/downloads/ -
OpenVPN openvpn-2.0.6.tar.gz
http://openvpn.net/release/openvpn-2.0.6.tar.gz
OpenVPN OpenVPN 2.0.2
-
OpenVPN openvpn-2.0.6.tar.gz
http://openvpn.net/release/openvpn-2.0.6.tar.gz
OpenVPN OpenVPN 2.0.3
-
OpenVPN openvpn-2.0.6.tar.gz
http://openvpn.net/release/openvpn-2.0.6.tar.gz
OpenVPN OpenVPN 2.0.4
-
OpenVPN openvpn-2.0.6.tar.gz
http://openvpn.net/release/openvpn-2.0.6.tar.gz
OpenVPN OpenVPN 2.0.5
-
OpenVPN openvpn-2.0.6.tar.gz
http://openvpn.net/release/openvpn-2.0.6.tar.gz