Date: Wed, 03 Dec 2014 13:13:17 +0100 From: Max Mühlbronner <mm@...om.com> To: oss-security@...ts.openwall.com Subject: Re: CVE-2014-8104 - Critical OpenVPN DoS Vulnerability Hi, just imagine a malicious user: signing up for e.g. anonymous VPN service and crashing the whole openVPN process, which would be affecting other users too. I would definitely consider this to be a critical issue. Max M. On 03.12.2014 11:11, Nicolas Gaudin wrote: > Hi, > Is this vulnerability really 'critical' if we consider that a malicious user > needs to be authenticated to crash the gateway? > I understand that the vulnerability is exploitable if a client is > compromised (certificate stolen). > In such a case (client compromised), the risk is greater as confidentiality > is breached. > > Nicolas > > -----Message d'origine----- > De : David White [mailto:dmwhite823@...il.com] > Envoyé : mercredi 3 décembre 2014 10:24 > À : oss-security@...ts.openwall.com > Objet : [oss-security] CVE-2014-8104 - Critical OpenVPN DoS Vulnerability > > I saw an email come through the pfSense list yesterday, but haven't seen > anything about it discussed here. So I'm bringing it to this list's > attention. > > https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b > > [ As a side note, I mistakenly thought the OP on the pfSense list mistakenly > posted his link to a forum post on OpenVPN that was written in 2010, when in > fact, that user had joined in 2010 but posted to the pfSense forum > recently - https://forums.openvpn.net/topic17625.html ] > > > -- > David
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.