Vulnerability Name:

CVE-2008-3459 (CCN-44209)

Assigned:2008-07-31
Published:2008-07-31
Updated:2017-08-08
Summary:Unspecified vulnerability in OpenVPN 2.1-beta14 through 2.1-rc8, when running on non-Windows systems, allows remote servers to execute arbitrary commands via crafted (1) lladdr and (2) iproute configuration directives, probably related to shell metacharacters.
The following events must take place for successful exploitation:
1) the client has agreed to allow the server to push configuration directives to it by including "pull" or the macro "client" in its configuration file
2) the client succesfully authenticates the server
3) the server is malicious or has been compromised and is under the control of the attacker
4) the client is running a non-Windows OS.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.6 High (CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
5.6 Medium (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-noinfo
CWE-16
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-3459

Source: CCN
Type: OpenVPN Change Log, 2008.07.31
Version 2.1_rc9

Source: CONFIRM
Type: UNKNOWN
http://openvpn.net/index.php/documentation/change-log/changelog-21.html

Source: CCN
Type: SECTRACK ID: 1020626
OpenVPN Client 'lladdr' or 'iproute' Configuration Directive Processing Bug Lets Remote Servers Execute Arbitrary Code

Source: CCN
Type: OpenVPN Web site
Downloads

Source: CCN
Type: OSVDB ID: 48481
OpenVPN Multiple Crafted Configuration Directive Unspecified Arbitrary Remote Command Execution

Source: BID
Type: UNKNOWN
30532

Source: CCN
Type: BID-30532
OpenVPN Client 'lladdr' and 'iproute' Configuration Directive Remote Code Execution Vulnerability

Source: SECTRACK
Type: UNKNOWN
1020626

Source: VUPEN
Type: Vendor Advisory
ADV-2008-2316

Source: XF
Type: UNKNOWN
openvpn-lladdr-iproute-code-execution(44209)

Source: XF
Type: UNKNOWN
openvpn-lladdr-iproute-code-execution(44209)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openvpn:openvpn:2.1:beta-14:*:*:*:*:*:*
  • OR cpe:/a:openvpn:openvpn:2.1:beta-15:*:*:*:*:*:*
  • OR cpe:/a:openvpn:openvpn:2.1:beta-16:*:*:*:*:*:*
  • OR cpe:/a:openvpn:openvpn:2.1:rc_1:*:*:*:*:*:*
  • OR cpe:/a:openvpn:openvpn:2.1:rc_2:*:*:*:*:*:*
  • OR cpe:/a:openvpn:openvpn:2.1:rc_3:*:*:*:*:*:*
  • OR cpe:/a:openvpn:openvpn:2.1:rc_4:*:*:*:*:*:*
  • OR cpe:/a:openvpn:openvpn:2.1:rc_5:*:*:*:*:*:*
  • OR cpe:/a:openvpn:openvpn:2.1:rc_6:*:*:*:*:*:*
  • OR cpe:/a:openvpn:openvpn:2.1:rc_7:*:*:*:*:*:*
  • OR cpe:/a:openvpn:openvpn:2.1:rc_8:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    openvpn openvpn 2.1 beta-14
    openvpn openvpn 2.1 beta-15
    openvpn openvpn 2.1 beta-16
    openvpn openvpn 2.1 rc_1
    openvpn openvpn 2.1 rc_2
    openvpn openvpn 2.1 rc_3
    openvpn openvpn 2.1 rc_4
    openvpn openvpn 2.1 rc_5
    openvpn openvpn 2.1 rc_6
    openvpn openvpn 2.1 rc_7
    openvpn openvpn 2.1 rc_8