{"id":"USN-7340-1","summary":"openvpn vulnerabilities","details":"It was discovered that OpenVPN did not perform proper input validation\nwhen generating a TLS key under certain configuration, which could lead to\na buffer overflow. An attacker could possibly use this issue to cause a\ndenial of service or execute arbitrary code. This issue only affected\nUbuntu 14.04 LTS, Ubuntu 16.04 LTS. (CVE-2017-12166)\n\nReynir Björnsson discovered that OpenVPN incorrectly handled certain\ncontrol channel messages with nonprintable characters. A remote attacker\ncould possibly use this issue to cause OpenVPN to consume resources, or\nfill up log files with garbage, leading to a denial of service.\n(CVE-2024-5594)\n","modified":"2026-02-10T04:47:18Z","published":"2025-03-11T03:13:12Z","related":["UBUNTU-CVE-2017-12166","UBUNTU-CVE-2024-5594"],"upstream":["CVE-2017-12166","CVE-2024-5594","UBUNTU-CVE-2017-12166","UBUNTU-CVE-2024-5594"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7340-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-12166"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-5594"}],"affected":[{"package":{"name":"openvpn","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/openvpn@2.3.2-7ubuntu3.2+esm2?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.3.2-7ubuntu3.2+esm2"}]}],"versions":["2.3.2-4ubuntu1","2.3.2-5ubuntu1","2.3.2-7ubuntu1","2.3.2-7ubuntu2","2.3.2-7ubuntu3","2.3.2-7ubuntu3.1","2.3.2-7ubuntu3.2","2.3.2-7ubuntu3.2+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.3.2-7ubuntu3.2+esm2","binary_name":"openvpn"}],"availability":"Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7340-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"id":"CVE-2017-12166","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2024-5594","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}},{"package":{"name":"openvpn","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/openvpn@2.3.10-1ubuntu2.2+esm2?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.3.10-1ubuntu2.2+esm2"}]}],"versions":["2.3.7-1ubuntu1","2.3.7-2ubuntu1","2.3.8-1ubuntu1","2.3.10-1ubuntu1","2.3.10-1ubuntu2","2.3.10-1ubuntu2.1","2.3.10-1ubuntu2.2","2.3.10-1ubuntu2.2+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.3.10-1ubuntu2.2+esm2","binary_name":"openvpn"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7340-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"id":"CVE-2017-12166","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2024-5594","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}},{"package":{"name":"openvpn","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/openvpn@2.4.4-2ubuntu1.7+esm1?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.4-2ubuntu1.7+esm1"}]}],"versions":["2.4.3-4ubuntu1","2.4.4-1ubuntu1","2.4.4-2ubuntu1","2.4.4-2ubuntu1.1","2.4.4-2ubuntu1.2","2.4.4-2ubuntu1.3","2.4.4-2ubuntu1.5","2.4.4-2ubuntu1.6","2.4.4-2ubuntu1.7"],"ecosystem_specific":{"binaries":[{"binary_version":"2.4.4-2ubuntu1.7+esm1","binary_name":"openvpn"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7340-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"id":"CVE-2024-5594","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}