-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
A new version of OpenVPN-NL (2.3.5-nl3) is available on the OpenVPN-NL site [1]. This version is based on OpenVPN 2.3.5 [2], and PolarSSL 1.2.12 [3].
This new version of OpenVPN-NL fixes a potential double free vulnerability in PolarSSL [4]. The vulnerability enables an attacker that can send TLS messages to an OpenVPN-NL instance to trick that instance to free an uninitialized pointer. This enables an attacker to mount a denial of service attack, and could potentially lead to remote code execution. If the recommended tls-auth mechanism is used in an OpenVPN-NL configuration, an attacker can only attack such an OpenVPN-NL instance if (s)he is in possession of the tls-auth key.
We have not (yet) seen any exploits targeting this vulnerability.
Users are advised to upgrade both OpenVPN-NL clients and servers to 2.3.5-nl3.
References - ---------- [1] https://openvpn.fox-it.com/ [2] https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn23 [3] https://polarssl.org/tech-updates/releases/polarssl-1.2.12-released [4] https://polarssl.org/tech-updates/security-advisories/polarssl-security-advi...
list-openvpn-nl@lists.fox-it.com