FreeBSD : OpenVPN -- potential side-channel/timing attack when comparing HMACs (92f30415-9935-11e2-ad4c-080027ef73ec)

low Nessus Plugin ID 65846

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The OpenVPN project reports :

OpenVPN 2.3.0 and earlier running in UDP mode are subject to chosen ciphertext injection due to a non-constant-time HMAC comparison function.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?56e4cef7

https://www.openwall.com/lists/oss-security/2013/05/06/6

http://www.nessus.org/u?ce50b4b8

http://www.nessus.org/u?4732bd5f

Plugin Details

Severity: Low

ID: 65846

File Name: freebsd_pkg_92f30415993511e2ad4c080027ef73ec.nasl

Version: 1.9

Type: local

Published: 4/8/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Low

Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:openvpn, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 3/31/2013

Vulnerability Publication Date: 3/19/2013

Reference Information

CVE: CVE-2013-2061