BSA-2017-339
21404
08 September 2017
23 June 2017
Closed
Medium
6.5
N/A
CVE-2017-7479
Summary
Security Advisory ID : BSA-2017-339
Component : OpenVPN
Revision : 2.0: Interim
An authenticated client can cause the server's the packet-id counter to roll over, which would lead the server process to hit an ASSERT() and stop running. To make the server hit the ASSERT(), the client must first cause the server to send it 2EXP32 packets (at least 196GB). OpenVPN versions 2.4.2 and 2.3.15 (and later) include these fixes.
Affected ProductsBrocade is investigating its product lines to determine which products may be affected by this vulnerability and the impact on each affected product.
Products Confirmed Not VulnerableBrocade Fabric OS, Brocade FastIron OS, Brocade NetIron OS, Brocade Network OS, Brocade ServerIron ADX, Brocade Services Director, Brocade SLX-OS, Brocade Virtual ADX, Brocade Virtual Traffic Manager, and Brocade Virtual Web Application Firewall are confirmed not affected by this vulnerability.
WorkaroundThere are no workarounds that address this vulnerability.
Revision History
Version | Change | Date | 1.0 | Initial Publication | June 23, 2017 |
---|---|---|
2.0 | Updated to address NOS | September 8, 2017 |