Vulnerability Description
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openvpn | Openvpn | <= 2.3.16 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2017/dsa-3900
- http://www.securityfocus.com/bid/99230Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038768
- https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243Vendor Advisory
- http://www.debian.org/security/2017/dsa-3900
- http://www.securityfocus.com/bid/99230Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038768
- https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243Vendor Advisory
FAQ
What is CVE-2017-7520?
CVE-2017-7520 is a vulnerability with a CVSS score of 7.4 (HIGH). OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker.
How severe is CVE-2017-7520?
CVE-2017-7520 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7520?
Check the references section above for vendor advisories and patch information. Affected products include: Openvpn Openvpn.