On 06/26/2015 07:48 AM, Jan Just Keijser wrote:
On 26/06/15 13:28, Gert Doering wrote:
Hi,

On Fri, Jun 26, 2015 at 12:16:43PM +0200, David Sommerseth wrote:
* Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
This might be an issue on OpenVPN on the server side.  However,
--tls-auth will reduce the attack vector to one of your own users.
As we're not using X509_cmp_time()...


that was my initial thought as well, but X509_cmp_time might be (is)
called by OpenSSL internally to check the dates on certificates and
perhaps CRLs. It would need further investigation, I guess.

Might an in-depth investigation on these issues take more time than building an updated installer?

Also, while David Sommerseth suggested in another email that --tls-auth provides good mitigation, note that not everyone is using that option. When I recently set up pfSense router, I couldn't get tls-auth working for some reason (probably quirks on the pfSense side).

Personally, I'd feel better with an updated client since I have customers using it to access patient health information. OpenVPN is the only entry point into their networks, which worries me because the other proprietary software they have is riddled with security holes (unfortunately I have no control over this). One successful OpenSSL exploit is all it would take to cause a disaster.

I'd offer to help update the installer, but... you don't typically want to accept help from a stranger for building binaries...

   - Joe


Reply via email to