APP: OpenVPN read_key Stack Based Buffer Overflow

This signature detects attempts to exploit a known vulnerability in OpenVPN. Successful exploitation could result in the execution of arbitrary code in the security context of ROOT or SYSTEM.

Extended Description

OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.

Affected Products

Debian debian_linux

References

BugTraq: 101153

CVE: CVE-2017-12166

Short Name
APP:MISC:OPENVPN-READKEY-BO
Severity
Major
Recommended
True
Recommended Action
Drop
Category
APP
Keywords
Based Buffer CVE-2017-12166 OpenVPN Overflow Stack bid:101153 read_key
Release Date
10/13/2017
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
Port
UDP/1194
False Positive
Unknown
Vendors

Debian

Openvpn

CVSS Score

6.8

Found a potential security threat?