Vulnerability Details : CVE-2017-7522
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service by authenticated remote attacker via sending a certificate with an embedded NULL character.
Vulnerability category: Input validationDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2017-7522
Probability of exploitation activity in the next 30 days: 0.29%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 65 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2017-7522
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
nvd@nist.gov |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
nvd@nist.gov |
CWE ids for CVE-2017-7522
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: secalert@redhat.com (Secondary)
-
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-7522
-
http://www.securitytracker.com/id/1038768
OpenVPN Multiple Flaws Let Remote Users Obtain Potentially Sensitive Information, Deny Service, and Execute Arbitrary Code - SecurityTracker
-
http://www.securityfocus.com/bid/99230
OpenVPN Multiple Security VulnerabilitiesThird Party Advisory;VDB Entry
-
https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
VulnerabilitiesFixedInOpenVPN243 – OpenVPN CommunityVendor Advisory
Products affected by CVE-2017-7522
- cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.4.0:alpha2:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.4.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.4.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.4.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.4.0:rc1:*:*:*:*:*:*