Hi, On 29-06-14 18:09, Jonathan K. Bullard wrote: > A recent _"Lab Mouse Security research blog" entry_ > <http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html> > claimed > that a bug exists in several implementations of the LZO algorithm > commonly used by OpenVPN and that the bug causes a security vulnerability. > > A rebuttal on the "RealTime Data Compression" blog > <http://fastcompression.blogspot.co.uk/2014/06/lets-move-on.html> points > out that the circumstances required to exploit the vulnerability make > exploitation unlikely. Among other requirements, the rebuttal says that > a problem only happens with block sizes larger than 8MB. > > Am I correct to assume that OpenVPN's use of LZO is restricted to much > smaller block sizes? I assume the block sizes that OpenVPN uses LZO for > are limited to the maximum packet size, which would be on the order of > 1500 bytes or so (because of MTU size limits). > > Or does OpenVPN ever use LZO on larger amounts of data? Is there any > possibility of OpenVPN using LZO on 8MB?
You are partly correct; OpenVPN parses UDP or TCP packets, which due to fragmentation can become as large as ~65KB. However, this is still within comfortable distance from the 'critical' 8MB boundary for LZ4, and 16MB for lzo. So OpenVPN is not vulnerable. Regards, -Steffan