CVE-2023-46849Divide By Zero in Access Server

CWE-369Divide By Zero7 documents6 sources
Severity
7.5HIGHNVD
EPSS
0.5%
top 34.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 11
Latest updateNov 16

Description

Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages6 packages

Debianopenvpn/openvpn< 2.6.3-1+deb12u2+2
Ubuntuopenvpn/openvpn< 2.6.5-0ubuntu1.1
NVDopenvpn/openvpn2.6.02.6.6
CVEListV5openvpn/openvpn_22.6.02.6.6
CVEListV5openvpn/access_server2.11.02.11.3+1

Also affects: Debian Linux 12.0, Fedora 39

🔴Vulnerability Details

4
OSV
openvpn vulnerabilities2023-11-16
CVEList
CVE-2023-46849: Using the --fragment option in certain configuration setups OpenVPN version 22023-11-11
OSV
CVE-2023-46849: Using the --fragment option in certain configuration setups OpenVPN version 22023-11-11
GHSA
GHSA-p99v-qjfm-8vvq: Using the --fragment option in certain configuration setups OpenVPN version 22023-11-11

📋Vendor Advisories

2
Ubuntu
OpenVPN vulnerabilities2023-11-16
Debian
CVE-2023-46849: openvpn - Using the --fragment option in certain configuration setups OpenVPN version 2.6....2023
CVE-2023-46849 — Divide By Zero in Access Server | cvebase