CVE-2016-6329

Priority
Low
Description
OpenVPN, when using a 64-bit block cipher, makes it easier for remote
attackers to obtain cleartext data via a birthday attack against a
long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN
session using Blowfish in CBC mode, aka a "Sweet32" attack.
References
Notes
 mdeslaur> openvpn 2.3 and earlier use BF-CBC by default unless the cipher
 mdeslaur> is specified manually. 2.3.12 was modified to display a warning
 mdeslaur> if a 64-bit cipher is selected.
 mdeslaur> Since this is just a warning, downgrading priority to low
 sbeattie> fixed in 2.4.0
Assigned-to
mdeslaur
Package
Upstream:released (2.3.12, 2.4.0)
Ubuntu 17.10 (Artful Aardvark):not-affected (2.4.0-4ubuntu1)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 LTS (Trusty Tahr):released (2.3.2-7ubuntu3.2)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (2.3.10-1ubuntu2.1)
Ubuntu 16.10 (Yakkety Yak):released (2.3.11-1ubuntu2.1)
Ubuntu 17.04 (Zesty Zapus):not-affected (2.4.0-4ubuntu1)
Patches:
Upstream:https://github.com/OpenVPN/openvpn/commit/610fdbbdb0abf65c1e7620143afccd62cd162a8f (warning/2.3)
Upstream:https://github.com/OpenVPN/openvpn/commit/c94b3ff0f5f1dbd4949f18f69ed3611f82a29021 (warning/trunk)
More Information

Updated: 2017-06-22 18:14:14 UTC (commit 12791)