Bug 1166910 (CVE-2014-8104)

Summary: CVE-2014-8104 openvpn: authenticated user can DoS OpenVPN by sending a too-short control channel packet to server
Product: [Other] Security Response Reporter: Vincent Danen <vdanen>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: davids, falonso, fweimer, jrusnack, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: openvpn 2.3.6 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-12-18 21:17:32 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1169487, 1169488    
Bug Blocks: 1166911    
Description Flags
upstream patch none

Description Vincent Danen 2014-11-21 23:12:37 UTC
It was discovered that an authenticated client could trigger an ASSERT() in OpenVPN by sending a too-short control channel packet to the server.  This could cause the OpenVPN server to crash and deny access to the VPN to other legitimate users.


Red Hat would like to thank the OpenVPN project for reporting this issue.  Upstream acknowledges Dragana Damjanovic as the original reporter.

Comment 1 Vincent Danen 2014-11-21 23:16:38 UTC
Created attachment 960011 [details]
upstream patch

Comment 4 Vincent Danen 2014-12-01 19:30:33 UTC
External References:


Comment 5 Vincent Danen 2014-12-01 19:32:58 UTC
Created openvpn tracking bugs for this issue:

Affects: fedora-all [bug 1169487]
Affects: epel-all [bug 1169488]

Comment 6 Vincent Danen 2014-12-01 19:34:06 UTC
Note that an update has been submitted for Fedora 21:


Also note the following mitigating factors from the upstream announcement:

Only tls-authenticated clients can trigger the vulnerability in the OpenVPN server. Thus both client certificates and TLS auth will protect against this exploit as long as all OpenVPN clients can be trusted to not be compromised and/or malicious. Note that username/password authentication does not protect against this exploit, and servers using --client-cert-not-required by definition have no client certificates to protect against this exploit.

In particular VPN service providers are affected, because anyone can get their hands on the necessary client certificates and TLS auth keys.