Hi,

On 05/22/2014 11:38 PM, Steffan Karger wrote:
> On 21-05-14 18:19, Lisa Minogue wrote:
>> According to Debian Security Advisory DSA-2931-1 
>> (http://www.debian.org/security/2014/dsa-2931) a bug in OpenSSL could result 
>> in a denial of service.
>>
>> Is OpenVPN 2.3.4 software (community edition, Microsoft Windows, Mac OS, 
>> *nix versions) affected by it?
> 
> Yes, if your OpenSSL is vulnerable, OpenVPN probably is too. I glanced
> over the code and the affected do_ssl3_write() seems to be in the normal
> TLS connection code path.

On a second look, OpenVPN is not vulnerable. The CVE explains:

"The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g,
when SSL_MODE_RELEASE_BUFFERS is enabled."

But the patch to enable SSL_MODE_RELEASE_BUFFERS has not been merged yet
(but probably will, because is reduces memory usage significantly on
servers with many connections, see
https://community.openvpn.net/openvpn/ticket/157).

The advice is as usual:
 * Update your OpenSSL.
 * Use TLS auth as an extra layer of protection.

Regards,
-Steffan


Reply via email to