-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.1359
   openvpn -- illegal client float can break VPN session for other users
                               17 April 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           openvpn
Publisher:         FreeBSD
Operating System:  FreeBSD
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Denial of Service -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-11810  

Original Bulletin: 
   http://www.vuxml.org/freebsd/8604121c-7fc2-11ea-bcac-7781e90b0c8f.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than FreeBSD. It is recommended that administrators
         running openvpn check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

openvpn -- illegal client float can break VPN session for other users

Affected packages
  openvpn         < 2.4.8_3
  openvpn-mbedtls < 2.4.8_3
  openvpn-devel   < 202016

Details

VuXML ID  8604121c-7fc2-11ea-bcac-7781e90b0c8f
Discovery 2020-04-13
Entry     2020-04-16

Lev Stipakov and Gert Doering report:

    There is a time frame between allocating peer-id and initializing data
    channel key (which is performed on receiving push request or on async
    push-reply) in which the existing peer-id float checks do not work right.

    If a "rogue" data channel packet arrives during that time frame from
    another address and with same peer-id, this would cause client to float to
    that new address.

    The net effect of this behaviour is that the VPN session for the "victim
    client" is broken. Since the "attacker client" does not have suitable keys,
    it can not inject or steal VPN traffic from the other session. The time
    window is small and it can not be used to attack a specific client's
    session, unless some other way is found to make it disconnect and reconnect
    first.

    [source]

References

CVE     CVE-2020-11810
URL     https://community.openvpn.net/openvpn/ticket/1272
URL     https://github.com/OpenVPN/openvpn/commit/
        f7b318f811bb43c0d3aa7f337ec6242ed2c33881
URL     https://patchwork.openvpn.net/patch/1077/
URL     https://sourceforge.net/p/openvpn/openvpn/ci/
        f7b318f811bb43c0d3aa7f337ec6242ed2c33881/
URL     https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/
        msg19720.html

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=P3Gf
-----END PGP SIGNATURE-----