<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for openvpn</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:1680-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-06-26T08:50:35Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-06-26T08:50:35Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-06-26T08:50:35Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for openvpn</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for openvpn fixes the following issues:

- Some parts of the certificate-parsing code did not always clear all allocated
  memory. This would have allowed clients to leak a few bytes of memory for
  each connection attempt, thereby facilitating a (quite inefficient) DoS
  attack on the server. [bsc#1044947, CVE-2017-7521]

- The ASN1 parsing code contained a bug that could have resulted in some
  buffers being free()d twice, and this issue could have potentially been
  triggered remotely by a VPN peer. [bsc#1044947, CVE-2017-7521]

- If clients used a HTTP proxy with NTLM authentication, a man-in-the-middle
  attacker between client and proxy could cause the client to crash or disclose
  at most 96 bytes of stack memory. The disclosed stack memory was likely to
  contain the proxy password. If the proxy password had not been reused, this
  was unlikely to compromise the security of the OpenVPN tunnel itself. Clients
  who did not use the --http-proxy option with ntlm2 authentication were not
  affected. [bsc#1044947, CVE-2017-7520]

- It was possible to trigger an assertion by sending a malformed IPv6 packet.
  That issue could have been abused to remotely shutdown an openvpn server or
  client, if IPv6 and --mssfix were enabled and if the IPv6 networks used
  inside the VPN were known. [bsc#1044947, CVE-2017-7508]

  
This update was imported from the SUSE:SLE-12:Update update project.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00031.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:1680-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="openvpn-2.3.8-8.10.1">
      <FullProductName ProductID="openvpn-2.3.8-8.10.1">openvpn-2.3.8-8.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvpn-auth-pam-plugin-2.3.8-8.10.1">
      <FullProductName ProductID="openvpn-auth-pam-plugin-2.3.8-8.10.1">openvpn-auth-pam-plugin-2.3.8-8.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvpn-devel-2.3.8-8.10.1">
      <FullProductName ProductID="openvpn-devel-2.3.8-8.10.1">openvpn-devel-2.3.8-8.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvpn-down-root-plugin-2.3.8-8.10.1">
      <FullProductName ProductID="openvpn-down-root-plugin-2.3.8-8.10.1">openvpn-down-root-plugin-2.3.8-8.10.1</FullProductName>
    </Branch>
    <Relationship ProductReference="openvpn-2.3.8-8.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:openvpn-2.3.8-8.10.1">openvpn-2.3.8-8.10.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="openvpn-auth-pam-plugin-2.3.8-8.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:openvpn-auth-pam-plugin-2.3.8-8.10.1">openvpn-auth-pam-plugin-2.3.8-8.10.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="openvpn-devel-2.3.8-8.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:openvpn-devel-2.3.8-8.10.1">openvpn-devel-2.3.8-8.10.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="openvpn-down-root-plugin-2.3.8-8.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:openvpn-down-root-plugin-2.3.8-8.10.1">openvpn-down-root-plugin-2.3.8-8.10.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet.</Note>
    </Notes>
    <CVE>CVE-2017-7508</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:openvpn-2.3.8-8.10.1</ProductID>
        <ProductID>openSUSE Leap 42.2:openvpn-auth-pam-plugin-2.3.8-8.10.1</ProductID>
        <ProductID>openSUSE Leap 42.2:openvpn-devel-2.3.8-8.10.1</ProductID>
        <ProductID>openSUSE Leap 42.2:openvpn-down-root-plugin-2.3.8-8.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00031.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7508.html</URL>
        <Description>CVE-2017-7508</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044947</URL>
        <Description>SUSE Bug 1044947</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker.</Note>
    </Notes>
    <CVE>CVE-2017-7520</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:openvpn-2.3.8-8.10.1</ProductID>
        <ProductID>openSUSE Leap 42.2:openvpn-auth-pam-plugin-2.3.8-8.10.1</ProductID>
        <ProductID>openSUSE Leap 42.2:openvpn-devel-2.3.8-8.10.1</ProductID>
        <ProductID>openSUSE Leap 42.2:openvpn-down-root-plugin-2.3.8-8.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00031.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7520.html</URL>
        <Description>CVE-2017-7520</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044947</URL>
        <Description>SUSE Bug 1044947</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension().</Note>
    </Notes>
    <CVE>CVE-2017-7521</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:openvpn-2.3.8-8.10.1</ProductID>
        <ProductID>openSUSE Leap 42.2:openvpn-auth-pam-plugin-2.3.8-8.10.1</ProductID>
        <ProductID>openSUSE Leap 42.2:openvpn-devel-2.3.8-8.10.1</ProductID>
        <ProductID>openSUSE Leap 42.2:openvpn-down-root-plugin-2.3.8-8.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00031.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7521.html</URL>
        <Description>CVE-2017-7521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044947</URL>
        <Description>SUSE Bug 1044947</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
