CVE-2020-15078: Authentication bypass with deferred authentication

Related Vulnerabilities: CVE-2020-15078  

Debian Bug report logs - #987380
CVE-2020-15078: Authentication bypass with deferred authentication

version graph

Reported by: Bernhard Schmidt <berni@debian.org>

Date: Thu, 22 Apr 2021 20:30:01 UTC

Severity: important

Tags: fixed-upstream, security, upstream

Found in versions openvpn/2.4.7-1, openvpn/2.5.1-1

Forwarded to https://community.openvpn.net/openvpn/wiki/CVE-2020-15078

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org:
Bug#987380; Package src:openvpn. (Thu, 22 Apr 2021 20:30:04 GMT) (full text, mbox, link).


Acknowledgement sent to Bernhard Schmidt <berni@debian.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org. (Thu, 22 Apr 2021 20:30:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Bernhard Schmidt <berni@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2020-15078: Authentication bypass with deferred authentication
Date: Thu, 22 Apr 2021 22:26:41 +0200
Source: openvpn
Severity: important
Tags: security
Forwarded: https://community.openvpn.net/openvpn/wiki/CVE-2020-15078
X-Debbugs-Cc: Debian Security Team <team@security.debian.org>

Overview

OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass
authentication and access control channel data on servers configured with
deferred authentication, which can be used to potentially trigger further
information leaks.


Detailed description

This bug allows - under very specific circumstances - to trick a server using
delayed authentication (plugin or management) into returning a PUSH_REPLY
before the AUTH_FAILED message, which can possibly be used to gather
information about a VPN setup.

In combination with "--auth-gen-token" or a user-specific token auth solution
it can be possible to get access to a VPN with an otherwise-invalid account.


Fixed OpenVPN versions

This vulnerability has been fixed in

    release/2.5
        Commit f7b3bf067ffce72e7de49a4174fd17a3a83f0573
        Commit 3d18e308c4e7e6f7ab7c2826c70d2d07b031c18a
        Commit 3aca477a1b58714754fea3a26d0892fffc51db6b 
    release/2.4
        Commit 0e5516a9d656ce86f7fb370c824344ea1760c255 

Releases with the fix are:

    OpenVPN 2.5.2
    OpenVPN 2.4.11 

Recommendations

If you are not using one of auth-gen-token, plugin, or management in your
config, you are safe. In doubt, upgrade. If you know you're using
deferred-auth, upgrade.



Marked as found in versions openvpn/2.5.1-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Fri, 23 Apr 2021 04:51:03 GMT) (full text, mbox, link).


Added tag(s) upstream and fixed-upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Fri, 23 Apr 2021 04:51:05 GMT) (full text, mbox, link).


Marked as found in versions openvpn/2.4.7-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Fri, 23 Apr 2021 04:51:06 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Fri Apr 23 08:07:51 2021; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.