ID CVE-2014-8104
Summary OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
References
Vulnerable Configurations
  • cpe:2.3:o:mageia:mageia:4.0
    cpe:2.3:o:mageia:mageia:4.0
  • Debian Linux 7.0
    cpe:2.3:o:debian:debian_linux:7.0
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
  • OpenSUSE 12.3
    cpe:2.3:o:opensuse:opensuse:12.3
  • OpenSUSE 13.1
    cpe:2.3:o:opensuse:opensuse:13.1
  • OpenSUSE 13.2
    cpe:2.3:o:opensuse:opensuse:13.2
  • OpenVPN 2.0.0
    cpe:2.3:a:openvpn:openvpn:2.0.0
  • cpe:2.3:a:openvpn:openvpn:2.0.1
    cpe:2.3:a:openvpn:openvpn:2.0.1
  • cpe:2.3:a:openvpn:openvpn:2.0.1_rc1
    cpe:2.3:a:openvpn:openvpn:2.0.1_rc1
  • cpe:2.3:a:openvpn:openvpn:2.0.1_rc2
    cpe:2.3:a:openvpn:openvpn:2.0.1_rc2
  • cpe:2.3:a:openvpn:openvpn:2.0.1_rc3
    cpe:2.3:a:openvpn:openvpn:2.0.1_rc3
  • cpe:2.3:a:openvpn:openvpn:2.0.1_rc4
    cpe:2.3:a:openvpn:openvpn:2.0.1_rc4
  • cpe:2.3:a:openvpn:openvpn:2.0.1_rc5
    cpe:2.3:a:openvpn:openvpn:2.0.1_rc5
  • cpe:2.3:a:openvpn:openvpn:2.0.1_rc6
    cpe:2.3:a:openvpn:openvpn:2.0.1_rc6
  • cpe:2.3:a:openvpn:openvpn:2.0.1_rc7
    cpe:2.3:a:openvpn:openvpn:2.0.1_rc7
  • cpe:2.3:a:openvpn:openvpn:2.0.2
    cpe:2.3:a:openvpn:openvpn:2.0.2
  • cpe:2.3:a:openvpn:openvpn:2.0.2_rc1
    cpe:2.3:a:openvpn:openvpn:2.0.2_rc1
  • cpe:2.3:a:openvpn:openvpn:2.0.3
    cpe:2.3:a:openvpn:openvpn:2.0.3
  • cpe:2.3:a:openvpn:openvpn:2.0.3_rc1
    cpe:2.3:a:openvpn:openvpn:2.0.3_rc1
  • cpe:2.3:a:openvpn:openvpn:2.0.4
    cpe:2.3:a:openvpn:openvpn:2.0.4
  • cpe:2.3:a:openvpn:openvpn:2.0.5
    cpe:2.3:a:openvpn:openvpn:2.0.5
  • cpe:2.3:a:openvpn:openvpn:2.0.6
    cpe:2.3:a:openvpn:openvpn:2.0.6
  • cpe:2.3:a:openvpn:openvpn:2.0.6_rc1
    cpe:2.3:a:openvpn:openvpn:2.0.6_rc1
  • cpe:2.3:a:openvpn:openvpn:2.0.7
    cpe:2.3:a:openvpn:openvpn:2.0.7
  • cpe:2.3:a:openvpn:openvpn:2.0.8
    cpe:2.3:a:openvpn:openvpn:2.0.8
  • cpe:2.3:a:openvpn:openvpn:2.0.9
    cpe:2.3:a:openvpn:openvpn:2.0.9
  • cpe:2.3:a:openvpn:openvpn:2.0.10
    cpe:2.3:a:openvpn:openvpn:2.0.10
  • cpe:2.3:a:openvpn:openvpn:2.0_rc1
    cpe:2.3:a:openvpn:openvpn:2.0_rc1
  • cpe:2.3:a:openvpn:openvpn:2.0_rc2
    cpe:2.3:a:openvpn:openvpn:2.0_rc2
  • cpe:2.3:a:openvpn:openvpn:2.0_rc3
    cpe:2.3:a:openvpn:openvpn:2.0_rc3
  • cpe:2.3:a:openvpn:openvpn:2.0_rc4
    cpe:2.3:a:openvpn:openvpn:2.0_rc4
  • cpe:2.3:a:openvpn:openvpn:2.0_rc5
    cpe:2.3:a:openvpn:openvpn:2.0_rc5
  • cpe:2.3:a:openvpn:openvpn:2.0_rc6
    cpe:2.3:a:openvpn:openvpn:2.0_rc6
  • cpe:2.3:a:openvpn:openvpn:2.0_rc7
    cpe:2.3:a:openvpn:openvpn:2.0_rc7
  • cpe:2.3:a:openvpn:openvpn:2.0_rc8
    cpe:2.3:a:openvpn:openvpn:2.0_rc8
  • cpe:2.3:a:openvpn:openvpn:2.0_rc9
    cpe:2.3:a:openvpn:openvpn:2.0_rc9
  • cpe:2.3:a:openvpn:openvpn:2.0_rc10
    cpe:2.3:a:openvpn:openvpn:2.0_rc10
  • cpe:2.3:a:openvpn:openvpn:2.0_rc11
    cpe:2.3:a:openvpn:openvpn:2.0_rc11
  • cpe:2.3:a:openvpn:openvpn:2.0_rc12
    cpe:2.3:a:openvpn:openvpn:2.0_rc12
  • cpe:2.3:a:openvpn:openvpn:2.0_rc13
    cpe:2.3:a:openvpn:openvpn:2.0_rc13
  • cpe:2.3:a:openvpn:openvpn:2.0_rc14
    cpe:2.3:a:openvpn:openvpn:2.0_rc14
  • cpe:2.3:a:openvpn:openvpn:2.0_rc15
    cpe:2.3:a:openvpn:openvpn:2.0_rc15
  • cpe:2.3:a:openvpn:openvpn:2.0_rc16
    cpe:2.3:a:openvpn:openvpn:2.0_rc16
  • cpe:2.3:a:openvpn:openvpn:2.0_rc17
    cpe:2.3:a:openvpn:openvpn:2.0_rc17
  • cpe:2.3:a:openvpn:openvpn:2.0_rc18
    cpe:2.3:a:openvpn:openvpn:2.0_rc18
  • cpe:2.3:a:openvpn:openvpn:2.0_rc19
    cpe:2.3:a:openvpn:openvpn:2.0_rc19
  • cpe:2.3:a:openvpn:openvpn:2.0_rc20
    cpe:2.3:a:openvpn:openvpn:2.0_rc20
  • cpe:2.3:a:openvpn:openvpn:2.0_rc21
    cpe:2.3:a:openvpn:openvpn:2.0_rc21
  • cpe:2.3:a:openvpn:openvpn:2.0_test1
    cpe:2.3:a:openvpn:openvpn:2.0_test1
  • cpe:2.3:a:openvpn:openvpn:2.0_test2
    cpe:2.3:a:openvpn:openvpn:2.0_test2
  • cpe:2.3:a:openvpn:openvpn:2.0_test3
    cpe:2.3:a:openvpn:openvpn:2.0_test3
  • cpe:2.3:a:openvpn:openvpn:2.0_test4
    cpe:2.3:a:openvpn:openvpn:2.0_test4
  • cpe:2.3:a:openvpn:openvpn:2.0_test5
    cpe:2.3:a:openvpn:openvpn:2.0_test5
  • cpe:2.3:a:openvpn:openvpn:2.0_test6
    cpe:2.3:a:openvpn:openvpn:2.0_test6
  • cpe:2.3:a:openvpn:openvpn:2.0_test7
    cpe:2.3:a:openvpn:openvpn:2.0_test7
  • cpe:2.3:a:openvpn:openvpn:2.0_test8
    cpe:2.3:a:openvpn:openvpn:2.0_test8
  • cpe:2.3:a:openvpn:openvpn:2.0_test9
    cpe:2.3:a:openvpn:openvpn:2.0_test9
  • cpe:2.3:a:openvpn:openvpn:2.0_test10
    cpe:2.3:a:openvpn:openvpn:2.0_test10
  • cpe:2.3:a:openvpn:openvpn:2.0_test11
    cpe:2.3:a:openvpn:openvpn:2.0_test11
  • cpe:2.3:a:openvpn:openvpn:2.0_test12
    cpe:2.3:a:openvpn:openvpn:2.0_test12
  • cpe:2.3:a:openvpn:openvpn:2.0_test14
    cpe:2.3:a:openvpn:openvpn:2.0_test14
  • cpe:2.3:a:openvpn:openvpn:2.0_test15
    cpe:2.3:a:openvpn:openvpn:2.0_test15
  • cpe:2.3:a:openvpn:openvpn:2.0_test16
    cpe:2.3:a:openvpn:openvpn:2.0_test16
  • cpe:2.3:a:openvpn:openvpn:2.0_test17
    cpe:2.3:a:openvpn:openvpn:2.0_test17
  • cpe:2.3:a:openvpn:openvpn:2.0_test18
    cpe:2.3:a:openvpn:openvpn:2.0_test18
  • cpe:2.3:a:openvpn:openvpn:2.0_test19
    cpe:2.3:a:openvpn:openvpn:2.0_test19
  • cpe:2.3:a:openvpn:openvpn:2.0_test20
    cpe:2.3:a:openvpn:openvpn:2.0_test20
  • cpe:2.3:a:openvpn:openvpn:2.0_test21
    cpe:2.3:a:openvpn:openvpn:2.0_test21
  • cpe:2.3:a:openvpn:openvpn:2.0_test22
    cpe:2.3:a:openvpn:openvpn:2.0_test22
  • cpe:2.3:a:openvpn:openvpn:2.0_test23
    cpe:2.3:a:openvpn:openvpn:2.0_test23
  • cpe:2.3:a:openvpn:openvpn:2.0_test24
    cpe:2.3:a:openvpn:openvpn:2.0_test24
  • cpe:2.3:a:openvpn:openvpn:2.0_test25
    cpe:2.3:a:openvpn:openvpn:2.0_test25
  • cpe:2.3:a:openvpn:openvpn:2.0_test26
    cpe:2.3:a:openvpn:openvpn:2.0_test26
  • cpe:2.3:a:openvpn:openvpn:2.0_test27
    cpe:2.3:a:openvpn:openvpn:2.0_test27
  • cpe:2.3:a:openvpn:openvpn:2.0_test28
    cpe:2.3:a:openvpn:openvpn:2.0_test28
  • cpe:2.3:a:openvpn:openvpn:2.0_test29
    cpe:2.3:a:openvpn:openvpn:2.0_test29
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-1
    cpe:2.3:a:openvpn:openvpn:2.1:beta-1
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-10
    cpe:2.3:a:openvpn:openvpn:2.1:beta-10
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-11
    cpe:2.3:a:openvpn:openvpn:2.1:beta-11
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-12
    cpe:2.3:a:openvpn:openvpn:2.1:beta-12
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-13
    cpe:2.3:a:openvpn:openvpn:2.1:beta-13
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-14
    cpe:2.3:a:openvpn:openvpn:2.1:beta-14
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-15
    cpe:2.3:a:openvpn:openvpn:2.1:beta-15
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-16
    cpe:2.3:a:openvpn:openvpn:2.1:beta-16
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-2
    cpe:2.3:a:openvpn:openvpn:2.1:beta-2
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-3
    cpe:2.3:a:openvpn:openvpn:2.1:beta-3
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-4
    cpe:2.3:a:openvpn:openvpn:2.1:beta-4
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-5
    cpe:2.3:a:openvpn:openvpn:2.1:beta-5
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-6
    cpe:2.3:a:openvpn:openvpn:2.1:beta-6
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-7
    cpe:2.3:a:openvpn:openvpn:2.1:beta-7
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-8
    cpe:2.3:a:openvpn:openvpn:2.1:beta-8
  • cpe:2.3:a:openvpn:openvpn:2.1:beta-9
    cpe:2.3:a:openvpn:openvpn:2.1:beta-9
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_1
    cpe:2.3:a:openvpn:openvpn:2.1:rc_1
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_10
    cpe:2.3:a:openvpn:openvpn:2.1:rc_10
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_11
    cpe:2.3:a:openvpn:openvpn:2.1:rc_11
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_12
    cpe:2.3:a:openvpn:openvpn:2.1:rc_12
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_13
    cpe:2.3:a:openvpn:openvpn:2.1:rc_13
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_14
    cpe:2.3:a:openvpn:openvpn:2.1:rc_14
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_15
    cpe:2.3:a:openvpn:openvpn:2.1:rc_15
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_16
    cpe:2.3:a:openvpn:openvpn:2.1:rc_16
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_17
    cpe:2.3:a:openvpn:openvpn:2.1:rc_17
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_18
    cpe:2.3:a:openvpn:openvpn:2.1:rc_18
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_19
    cpe:2.3:a:openvpn:openvpn:2.1:rc_19
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_2
    cpe:2.3:a:openvpn:openvpn:2.1:rc_2
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_20
    cpe:2.3:a:openvpn:openvpn:2.1:rc_20
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_21
    cpe:2.3:a:openvpn:openvpn:2.1:rc_21
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_22
    cpe:2.3:a:openvpn:openvpn:2.1:rc_22
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_3
    cpe:2.3:a:openvpn:openvpn:2.1:rc_3
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_4
    cpe:2.3:a:openvpn:openvpn:2.1:rc_4
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_5
    cpe:2.3:a:openvpn:openvpn:2.1:rc_5
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_6
    cpe:2.3:a:openvpn:openvpn:2.1:rc_6
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_7
    cpe:2.3:a:openvpn:openvpn:2.1:rc_7
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_8
    cpe:2.3:a:openvpn:openvpn:2.1:rc_8
  • cpe:2.3:a:openvpn:openvpn:2.1:rc_9
    cpe:2.3:a:openvpn:openvpn:2.1:rc_9
  • OpenVPN 2.1.0
    cpe:2.3:a:openvpn:openvpn:2.1.0
  • cpe:2.3:a:openvpn:openvpn:2.1.1
    cpe:2.3:a:openvpn:openvpn:2.1.1
  • cpe:2.3:a:openvpn:openvpn:2.1.2
    cpe:2.3:a:openvpn:openvpn:2.1.2
  • cpe:2.3:a:openvpn:openvpn:2.1.3
    cpe:2.3:a:openvpn:openvpn:2.1.3
  • cpe:2.3:a:openvpn:openvpn:2.1.4
    cpe:2.3:a:openvpn:openvpn:2.1.4
  • cpe:2.3:a:openvpn:openvpn:2.2:beta1
    cpe:2.3:a:openvpn:openvpn:2.2:beta1
  • cpe:2.3:a:openvpn:openvpn:2.2:beta2
    cpe:2.3:a:openvpn:openvpn:2.2:beta2
  • cpe:2.3:a:openvpn:openvpn:2.2:beta3
    cpe:2.3:a:openvpn:openvpn:2.2:beta3
  • cpe:2.3:a:openvpn:openvpn:2.2:beta4
    cpe:2.3:a:openvpn:openvpn:2.2:beta4
  • cpe:2.3:a:openvpn:openvpn:2.2:beta5
    cpe:2.3:a:openvpn:openvpn:2.2:beta5
  • OpenVPN 2.2.0
    cpe:2.3:a:openvpn:openvpn:2.2.0
  • cpe:2.3:a:openvpn:openvpn:2.2.1
    cpe:2.3:a:openvpn:openvpn:2.2.1
  • cpe:2.3:a:openvpn:openvpn:2.2.2
    cpe:2.3:a:openvpn:openvpn:2.2.2
  • cpe:2.3:a:openvpn:openvpn:2.3:alpha1
    cpe:2.3:a:openvpn:openvpn:2.3:alpha1
  • cpe:2.3:a:openvpn:openvpn:2.3:alpha2
    cpe:2.3:a:openvpn:openvpn:2.3:alpha2
  • cpe:2.3:a:openvpn:openvpn:2.3:alpha3
    cpe:2.3:a:openvpn:openvpn:2.3:alpha3
  • cpe:2.3:a:openvpn:openvpn:2.3:beta1
    cpe:2.3:a:openvpn:openvpn:2.3:beta1
  • cpe:2.3:a:openvpn:openvpn:2.3:rc1
    cpe:2.3:a:openvpn:openvpn:2.3:rc1
  • cpe:2.3:a:openvpn:openvpn:2.3:rc2
    cpe:2.3:a:openvpn:openvpn:2.3:rc2
  • OpenVPN 2.3.0
    cpe:2.3:a:openvpn:openvpn:2.3.0
  • cpe:2.3:a:openvpn:openvpn:2.3.1
    cpe:2.3:a:openvpn:openvpn:2.3.1
  • cpe:2.3:a:openvpn:openvpn:2.3.2
    cpe:2.3:a:openvpn:openvpn:2.3.2
  • cpe:2.3:a:openvpn:openvpn:2.3.3
    cpe:2.3:a:openvpn:openvpn:2.3.3
  • cpe:2.3:a:openvpn:openvpn:2.3.4
    cpe:2.3:a:openvpn:openvpn:2.3.4
  • cpe:2.3:a:openvpn:openvpn:2.3.5
    cpe:2.3:a:openvpn:openvpn:2.3.5
  • Canonical Ubuntu Linux 12.04 LTS
    cpe:2.3:o:canonical:ubuntu_linux:12.04:-:-:-:lts
  • Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:14.04:-:-:-:lts
  • Canonical Ubuntu Linux 14.10
    cpe:2.3:o:canonical:ubuntu_linux:14.10
CVSS
Base: 6.8 (as of 29-08-2016 - 14:22)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE_INSTANCE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
nessus via4
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-2430-1.NASL
    description Dragana Damjanovic discovered that OpenVPN incorrectly handled certain control channel packets. An authenticated attacker could use this issue to cause an OpenVPN server to crash, resulting in a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 79689
    published 2014-12-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79689
    title Ubuntu 12.04 LTS / 14.04 LTS / 14.10 : openvpn vulnerability (USN-2430-1)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2014-344-04.NASL
    description New openvpn packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue.
    last seen 2019-02-21
    modified 2014-12-15
    plugin id 79869
    published 2014-12-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79869
    title Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : openvpn (SSA:2014-344-04)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2014-459.NASL
    description OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
    last seen 2019-02-21
    modified 2018-04-18
    plugin id 79873
    published 2014-12-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79873
    title Amazon Linux AMI : openvpn (ALAS-2014-459)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2014-16273.NASL
    description Fix for CVE-2014-8104. https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e 732b Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-19
    plugin id 79930
    published 2014-12-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79930
    title Fedora 20 : openvpn-2.3.6-1.fc20 / pkcs11-helper-1.11-3.fc20 (2014-16273)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2014-246.NASL
    description Updated openvpn packages fix security vulnerability : Dragana Damjanovic discovered that OpenVPN incorrectly handled certain control channel packets. An authenticated attacker could use this issue to cause an OpenVPN server to crash, resulting in a denial of service (CVE-2014-8104). The openvpn packages has been updated to the 2.3.2 version and patched to correct this issue.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 79991
    published 2014-12-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79991
    title Mandriva Linux Security Advisory : openvpn (MDVSA-2014:246)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-98.NASL
    description Dragana Damjanovic discovered that an authenticated client could crash an OpenVPN server by sending a control packet containing less than four bytes as payload. For the oldstable distribution (squeeze), this problem has been fixed in version 2.1.3-2+squeeze3 in squeeze-lts. We recommend that you upgrade your openvpn packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-12-02
    plugin id 82243
    published 2015-03-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=82243
    title Debian DLA-98-1 : openvpn security update
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_OPENVPN-141203.NASL
    description This update fixes a critical denial of service vulnerability in OpenVPN : - Critical denial of service vulnerability in OpenVPN servers that can be triggered by authenticated attackers. Also an incompatibility with OpenVPN and OpenSSL in FIPS mode has been fixed. (bnc#895882). (CVE-2014-8104)
    last seen 2019-02-21
    modified 2014-12-09
    plugin id 79822
    published 2014-12-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79822
    title SuSE 11.3 Security Update : OpenVPN (SAT Patch Number 10061)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2014-16234.NASL
    description Fix for CVE-2014-8104. https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e 732b Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-19
    plugin id 79922
    published 2014-12-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79922
    title Fedora 19 : openvpn-2.3.6-1.fc19 / pkcs11-helper-1.11-3.fc19 (2014-16234)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2014-759.NASL
    description openvpn was updated to fix a denial-of-service vulnerability where an authenticated client could stop the server by triggering a server-side ASSERT (bnc#907764,CVE-2014-8104),
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 79821
    published 2014-12-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79821
    title openSUSE Security Update : openvpn (openSUSE-SU-2014:1594-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2014-1694-1.NASL
    description A remote denial of service attack against openvpn was fixed, where a authenticated client cloud stop the server by triggering a server-side ASSERT (CVE-2014-8104), Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 83652
    published 2015-05-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83652
    title SUSE SLED12 / SLES12 Security Update : openvpn (SUSE-SU-2014:1694-1)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2015-139.NASL
    description Updated openvpn packages fix security vulnerability : Dragana Damjanovic discovered that OpenVPN incorrectly handled certain control channel packets. An authenticated attacker could use this issue to cause an OpenVPN server to crash, resulting in a denial of service (CVE-2014-8104).
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 82392
    published 2015-03-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=82392
    title Mandriva Linux Security Advisory : openvpn (MDVSA-2015:139)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_23AB5C3E79C311E48B1ED050992ECDE8.NASL
    description The OpenVPN project reports : In late November 2014 Dragana Damjanovic notified OpenVPN developers of a critical denial of service security vulnerability (CVE-2014-8104). The vulnerability allows an tls-authenticated client to crash the server by sending a too-short control channel packet to the server. In other words this vulnerability is denial of service only.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 79656
    published 2014-12-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79656
    title FreeBSD : OpenVPN -- denial of service security vulnerability (23ab5c3e-79c3-11e4-8b1e-d050992ecde8)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-3084.NASL
    description Dragana Damjanovic discovered that an authenticated client could crash an OpenVPN server by sending a control packet containing less than four bytes as payload.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 79669
    published 2014-12-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79669
    title Debian DSA-3084-1 : openvpn - security update
  • NASL family Windows
    NASL id OPENVPN_2_3_6.NASL
    description According to its self-reported version number, the version of OpenVPN installed on the remote host is affected by an error related to 'Control Channel Packet' handling and TLS-authenticated clients that could allow denial of service attacks.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 79746
    published 2014-12-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79746
    title OpenVPN 2.x < 2.2.3 / 2.3.6 Control Channel Packet Handling DoS
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201412-41.NASL
    description The remote host is affected by the vulnerability described in GLSA-201412-41 (OpenVPN: Denial of Service) OpenVPN does not properly handle control channel packets that are too small. Impact : A remote authenticated attacker could send a specially crafted control channel packet, possibly resulting in a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2015-04-13
    plugin id 80262
    published 2014-12-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80262
    title GLSA-201412-41 : OpenVPN: Denial of Service
refmap via4
confirm
debian DSA-3084
mandriva MDVSA-2015:139
suse openSUSE-SU-2014:1594
ubuntu USN-2430-1
Last major update 29-08-2016 - 14:46
Published 03-12-2014 - 13:59
Last modified 30-10-2018 - 12:27
Back to Top