CVE-2013-2061 — Sensitive Information Exposure in Openvpn
Severity
2.6LOWNVD
EPSS
1.5%
top 19.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 18
Latest updateAug 23
Description
The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher.
CVSS vector
AV:N/AC:H/C:P/I:N/A:NExploitability: 4.9 | Impact: 2.9
Affected Packages5 packages
Patches
🔴Vulnerability Details
2📋Vendor Advisories
2📄Research Papers
1💬Community
3Bugzilla▶
CVE-2013-2061 openvpn: use of non-constant-time memcmp in HMAC comparison in openvpn_decrypt↗2013-05-06
Bugzilla▶
CVE-2013-2061 openvpn: use of non-constant-time memcmp in HMAC comparison in openvpn_decrypt [fedora-all]↗2013-05-06
Bugzilla▶
CVE-2013-2061 openvpn: use of non-constant-time memcmp in HMAC comparison in openvpn_decrypt [epel-all]↗2013-05-06