{"id":"CVE-2013-2061","details":"The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher.","modified":"2026-04-10T03:44:24.995974Z","published":"2013-11-18T02:55:07Z","references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2013-11/msg00012.html"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:167"},{"type":"EVIDENCE","url":"https://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2ee"},{"type":"FIX","url":"https://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2ee"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=960192"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105568.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105609.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2013-11/msg00016.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2013/05/06/6"},{"type":"WEB","url":"https://bugs.gentoo.org/show_bug.cgi?id=468756"},{"type":"WEB","url":"https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-f375aa67cc"}],"schema_version":"1.7.5"}