]> git.ipfire.org Git - thirdparty/openvpn.git/commit
Don't assert out on receiving too-large control packets (CVE-2017-7478)
authorSteffan Karger <steffan.karger@fox-it.com>
Thu, 11 May 2017 09:00:57 +0000 (11:00 +0200)
committerDavid Sommerseth <davids@openvpn.net>
Thu, 11 May 2017 10:55:31 +0000 (12:55 +0200)
commitfeb35ee5cac605edddd6e9dc62941e2c53f96fb3
tree64c931b66336b3f3cc898379bbc9ad3cedb30f96
parentb727643cdf4e078f132a90e1c474a879a5760578
Don't assert out on receiving too-large control packets (CVE-2017-7478)

Commit 358f513c changed the maximum size of accepted control channel
packets.  This was needed for crypto negotiation (which is needed for a
nice transition to a new default cipher), but exposed a DoS
vulnerability.  The vulnerability was found during the OpenVPN 2.4 code
audit by Quarkslab (commisioned by OSTIF).

To fix the issue, we should not ASSERT() on external input (in this case
the received packet size), but instead gracefully error out and drop the
invalid packet.

CVE: 2017-7478
Signed-off-by: Steffan Karger <steffan.karger@fox-it.com>
Acked-by: Gert Doering <gert@greenie.muc.de>
Acked-by: David Sommerseth <davids@openvpn.net>
Message-Id: <1494493257-8125-1-git-send-email-steffan.karger@fox-it.com>
URL: http://www.mail-archive.com/search?l=mid&q=1494493257-8125-1-git-send-email-steffan.karger@fox-it.com
Signed-off-by: David Sommerseth <davids@openvpn.net>
Changes.rst
src/openvpn/ssl.c