BSA-2017-339

Brocade Fabric OS

2 more products

21404

08 September 2017

23 June 2017

Closed

Medium

6.5

N/A

CVE-2017-7479

Summary

Security Advisory ID : BSA-2017-339

Component : OpenVPN

Revision : 2.0: Interim

An authenticated client can cause the server's the packet-id counter to roll over, which would lead the server process to hit an ASSERT() and stop running. To make the server hit the ASSERT(), the client must first cause the server to send it 2EXP32 packets (at least 196GB). OpenVPN versions 2.4.2 and 2.3.15 (and later) include these fixes.

Affected Products

Brocade is investigating its product lines to determine which products may be affected by this vulnerability and the impact on each affected product.

Products Confirmed Not Vulnerable

Brocade Fabric OS, Brocade FastIron OS, Brocade NetIron OS, Brocade Network OS, Brocade ServerIron ADX, Brocade Services Director, Brocade SLX-OS, Brocade Virtual ADX, Brocade Virtual Traffic Manager, and Brocade Virtual Web Application Firewall are confirmed not affected by this vulnerability.

Workaround

There are no workarounds that address this vulnerability.


Revision History

Version Change Date
1.0 Initial Publication June 23, 2017
2.0 Updated to address NOS September 8, 2017