Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2016-6329

Published: 31 January 2017

OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.

Notes

AuthorNote
mdeslaur
openvpn 2.3 and earlier use BF-CBC by default unless the cipher
is specified manually. 2.3.12 was modified to display a warning
if a 64-bit cipher is selected.
Since this is just a warning, downgrading priority to low
sbeattie
fixed in 2.4.0

Priority

Low

CVSS 3 base score: 5.9

Status

Package Release Status
openvpn
Launchpad, Ubuntu, Debian
artful Not vulnerable
(2.4.0-4ubuntu1)
bionic Not vulnerable
(2.4.0-4ubuntu1)
cosmic Not vulnerable
(2.4.0-4ubuntu1)
disco Not vulnerable
(2.4.0-4ubuntu1)
eoan Not vulnerable
(2.4.0-4ubuntu1)
focal Not vulnerable
(2.4.0-4ubuntu1)
groovy Not vulnerable
(2.4.0-4ubuntu1)
hirsute Not vulnerable
(2.4.0-4ubuntu1)
precise Ignored
(end of ESM support, was needed)
trusty
Released (2.3.2-7ubuntu3.2)
upstream
Released (2.3.12, 2.4.0)
xenial
Released (2.3.10-1ubuntu2.1)
yakkety
Released (2.3.11-1ubuntu2.1)
zesty Not vulnerable
(2.4.0-4ubuntu1)
Patches:
upstream: https://github.com/OpenVPN/openvpn/commit/610fdbbdb0abf65c1e7620143afccd62cd162a8f (warning/2.3)
upstream: https://github.com/OpenVPN/openvpn/commit/c94b3ff0f5f1dbd4949f18f69ed3611f82a29021 (warning/trunk)