OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GJUXEYHUPREEBPX23VPEKMFXUPVO3PMU/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLDB3OBQ3AODYYRN7NRCABV6I4AUFAT6/ | vendor advisory |
https://community.openvpn.net/openvpn/wiki/CVE-2020-15078 | patch vendor advisory |
https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements | broken link |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGEGLC4YGBDN5CGHTNWN2GH6DJJA36T2/ | vendor advisory |
https://security.gentoo.org/glsa/202105-25 | third party advisory vendor advisory |
https://usn.ubuntu.com/usn/usn-4933-1 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html | third party advisory mailing list |