CVE-2016-6329
Published: 31 January 2017
OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
Notes
Author | Note |
---|---|
mdeslaur | openvpn 2.3 and earlier use BF-CBC by default unless the cipher is specified manually. 2.3.12 was modified to display a warning if a 64-bit cipher is selected. Since this is just a warning, downgrading priority to low |
sbeattie | fixed in 2.4.0 |
Priority
CVSS 3 base score: 5.9
Status
Package | Release | Status |
---|---|---|
openvpn Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(2.4.0-4ubuntu1)
|
bionic |
Not vulnerable
(2.4.0-4ubuntu1)
|
|
cosmic |
Not vulnerable
(2.4.0-4ubuntu1)
|
|
disco |
Not vulnerable
(2.4.0-4ubuntu1)
|
|
eoan |
Not vulnerable
(2.4.0-4ubuntu1)
|
|
focal |
Not vulnerable
(2.4.0-4ubuntu1)
|
|
groovy |
Not vulnerable
(2.4.0-4ubuntu1)
|
|
hirsute |
Not vulnerable
(2.4.0-4ubuntu1)
|
|
precise |
Ignored
(end of ESM support, was needed)
|
|
trusty |
Released
(2.3.2-7ubuntu3.2)
|
|
upstream |
Released
(2.3.12, 2.4.0)
|
|
xenial |
Released
(2.3.10-1ubuntu2.1)
|
|
yakkety |
Released
(2.3.11-1ubuntu2.1)
|
|
zesty |
Not vulnerable
(2.4.0-4ubuntu1)
|
|
Patches: upstream: https://github.com/OpenVPN/openvpn/commit/610fdbbdb0abf65c1e7620143afccd62cd162a8f (warning/2.3) upstream: https://github.com/OpenVPN/openvpn/commit/c94b3ff0f5f1dbd4949f18f69ed3611f82a29021 (warning/trunk) |