CVE-2016-6329

OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
References
Link Resource
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697 Permissions Required Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21991482 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21995039 Third Party Advisory
http://www.securityfocus.com/bid/92631 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1036695 Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://community.openvpn.net/openvpn/wiki/SWEET32 Vendor Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403 Third Party Advisory
https://security.gentoo.org/glsa/201611-02 Third Party Advisory
https://sweet32.info/ Technical Description Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697 Permissions Required Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21991482 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21995039 Third Party Advisory
http://www.securityfocus.com/bid/92631 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1036695 Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://community.openvpn.net/openvpn/wiki/SWEET32 Vendor Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403 Third Party Advisory
https://security.gentoo.org/glsa/201611-02 Third Party Advisory
https://sweet32.info/ Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:55

Type Values Removed Values Added
References () http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697 - Permissions Required, Third Party Advisory () http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697 - Permissions Required, Third Party Advisory
References () http://www-01.ibm.com/support/docview.wss?uid=swg21991482 - Third Party Advisory () http://www-01.ibm.com/support/docview.wss?uid=swg21991482 - Third Party Advisory
References () http://www-01.ibm.com/support/docview.wss?uid=swg21995039 - Third Party Advisory () http://www-01.ibm.com/support/docview.wss?uid=swg21995039 - Third Party Advisory
References () http://www.securityfocus.com/bid/92631 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92631 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1036695 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1036695 - Third Party Advisory, VDB Entry
References () https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf -
References () https://community.openvpn.net/openvpn/wiki/SWEET32 - Vendor Advisory () https://community.openvpn.net/openvpn/wiki/SWEET32 - Vendor Advisory
References () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403 - Third Party Advisory () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403 - Third Party Advisory
References () https://security.gentoo.org/glsa/201611-02 - Third Party Advisory () https://security.gentoo.org/glsa/201611-02 - Third Party Advisory
References () https://sweet32.info/ - Technical Description, Third Party Advisory () https://sweet32.info/ - Technical Description, Third Party Advisory

Information

Published : 2017-01-31 22:59

Updated : 2024-11-21 02:55


NVD link : CVE-2016-6329

Mitre link : CVE-2016-6329

CVE.ORG link : CVE-2016-6329


JSON object : View

Products Affected

openvpn

  • openvpn
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-310

Cryptographic Issues