2.6
CVSSv2

CVE-2013-2061

Published: 18/11/2013 Updated: 12/05/2020
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 231
Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Summary

The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and previous versions, when running in UDP mode, allows remote malicious users to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher.

Vulnerable Product Search on Vulmon Subscribe to Product

openvpn openvpn 1.6.0

openvpn openvpn 1.5.0

openvpn openvpn 1.3.0

openvpn openvpn 1.2.1

openvpn openvpn 2.1.0

openvpn openvpn access server 2.0.0

openvpn openvpn 1.3.2

openvpn openvpn 1.3.1

openvpn openvpn 1.4.3

openvpn openvpn 1.4.2

openvpn openvpn 1.2.0

openvpn openvpn

openvpn openvpn 2.2.0

openvpn openvpn 1.4.1

openvpn openvpn 1.4.0

opensuse opensuse 11.4

Vendor Advisories

Debian Bug report logs - #707329 openvpn: CVE-2013-2061: use of non-constant-time memcmp in HMAC comparison in openvpn_decrypt Package: openvpn; Maintainer for openvpn is Bernhard Schmidt <berni@debianorg>; Source for openvpn is src:openvpn (PTS, buildd, popcon) Reported by: Salvatore Bonaccorso <carnil@debianorg> ...
OpenVPN could be made to expose sensitive information over the network ...
The openvpn_decrypt function in cryptoc in OpenVPN 230 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher ...