Vulnerability Bulletins |
Ejecución remota de código en clientes de OpenVPN |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Obtener acceso |
Dificulty | Experto |
Required attacker level | Acceso remoto con cuenta |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | OpenVPN 2.0-2.0.5 |
Description |
|
Se ha descubierto una vulnerabilidad en OpenVPN 2.0 hasta 2.0.5. La vulnerabilidad reside en un error al manejar la variable de entorno "LD_PRELOAD". Un atacante remoto podría ejecutar código arbitrario en un cliente de OpenVPN mediante la configuración de un servidor malicioso. |
|
Solution |
|
Actualización de software Mandriva Multi Network Firewall 2.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/RPMS/openvpn-2.0.1-0.3.M20mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/SRPMS/openvpn-2.0.1-0.3.M20mdk.src.rpm Mandrivalinux 2006 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/openvpn-2.0.1-2.2.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/openvpn-2.0.1-2.2.20060mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/openvpn-2.0.1-2.2.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/SRPMS/openvpn-2.0.1-2.2.20060mdk.src.rpm Debian Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sarge3.dsc http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sarge3.diff.gz http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sarge3_alpha.deb AMD64 http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sarge3_amd64.deb ARM http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sarge3_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sarge3_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sarge3_ia64.deb HP Precision http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sarge3_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sarge3_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sarge3_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sarge3_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sarge3_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sarge3_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/o/openvpn/openvpn_2.0-1sarge3_sparc.deb Suse Linux Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux |
|
Standar resources |
|
Property | Value |
CVE | CVE-2006-1629 |
BID | 17392 |
Other resources |
|
OpenVPN 2.0.x Change Log http://openvpn.net/changelog.html OpenVPN http://sourceforge.net/mailarchive/forum.php?thread_id=10093825&forum_id=8482 Mandriva Security Advisory (MDKSA-2006:069) http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:069 Debian Security Advisory (DSA 1045-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00130.html SUSE Security Advisory (SUSE-SR:2006:009) http://www.novell.com/linux/security/advisories/2006_04_28.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2006-04-11 |
1.1 | Aviso emitido por Debian (DSA 1045-1) | 2006-04-27 |
1.2 | Aviso emitido por Suse (SUSE-SR:2006:009) | 2006-05-02 |