On Tue, Nov 23, 2021 at 11:13 AM Selva Nair <selva.n...@gmail.com> wrote:

>
>
> On Tue, Nov 23, 2021 at 8:51 AM Ralf Hildebrandt <
> ralf.hildebra...@charite.de> wrote:
>
>> Yeah, it's in german, but anyway:
>>
>> https://www.heise.de/news/FBI-warnt-vor-Einbruechen-via-VPN-Software-6274101.html
>>
>> "An attacker can take leverage on this architecture and send the
>> config command from any application running on the local host machine
>> to force the back-end server into initializing a new open-VPN instance
>> with arbitrary open-VPN configuration. This could result in the
>> attacker achieving execution with privileges of a SYSTEM user."
>
>
This description appears to relate to OpenVPN Interactive Service. If so,
it's not correct. The service runs OpenVPN.exe as a user, not as SYSTEM. On
top of it a user can send arbitrary configs to the service only if an
administrator grants the user permission to do it --- via a group
membership. The user cannot start arbitrary "openvpn.exe" processes using
the service: the process must reside in a location where an admin user has
installed it.

Selva

>
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to