Vulnerabilities > CVE-2018-9336 - Double Free vulnerability in multiple products
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 25 | |
OS | 5 |
Common Weakness Enumeration (CWE)
Nessus
NASL family SuSE Local Security Checks NASL id OPENSUSE-2018-705.NASL description This update for openvpn fixes the following issues : - CVE-2018-9336: Fix potential double-free() in Interactive Service could lead to denial of service (bsc#1090839). This update was imported from the SUSE:SLE-15:Update update project. last seen 2020-06-05 modified 2018-07-09 plugin id 110961 published 2018-07-09 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/110961 title openSUSE Security Update : openvpn (openSUSE-2018-705) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update openSUSE-2018-705. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(110961); script_version("1.5"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2018-9336"); script_xref(name:"TRA", value:"TRA-2018-09"); script_name(english:"openSUSE Security Update : openvpn (openSUSE-2018-705)"); script_summary(english:"Check for the openSUSE-2018-705 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "This update for openvpn fixes the following issues : - CVE-2018-9336: Fix potential double-free() in Interactive Service could lead to denial of service (bsc#1090839). This update was imported from the SUSE:SLE-15:Update update project." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1090839" ); script_set_attribute( attribute:"see_also", value:"https://www.tenable.com/security/research/tra-2018-09" ); script_set_attribute( attribute:"solution", value:"Update the affected openvpn packages." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:openvpn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:openvpn-auth-pam-plugin"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:openvpn-auth-pam-plugin-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:openvpn-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:openvpn-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:openvpn-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:openvpn-down-root-plugin"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:openvpn-down-root-plugin-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.0"); script_set_attribute(attribute:"patch_publication_date", value:"2018/07/06"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/07/09"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE15\.0)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.0", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(x86_64)$") audit(AUDIT_ARCH_NOT, "x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE15.0", reference:"openvpn-2.4.3-lp150.3.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"openvpn-auth-pam-plugin-2.4.3-lp150.3.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"openvpn-auth-pam-plugin-debuginfo-2.4.3-lp150.3.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"openvpn-debuginfo-2.4.3-lp150.3.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"openvpn-debugsource-2.4.3-lp150.3.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"openvpn-devel-2.4.3-lp150.3.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"openvpn-down-root-plugin-2.4.3-lp150.3.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"openvpn-down-root-plugin-debuginfo-2.4.3-lp150.3.3.1") ) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openvpn / openvpn-auth-pam-plugin / etc"); }
NASL family Windows NASL id OPENVPN_2_4_6.NASL description According to its self-reported version number, the version of OpenVPN installed on the remote Windows host is affected by a denial of service (DoS) vulnerability in its interactive service helper component due to an invalid level of validation for incoming requests. An unauthenticated, local attacker can exploit this issue, by sending malformed requests, to cause the application to stop responding. last seen 2020-06-01 modified 2020-06-02 plugin id 125263 published 2019-05-17 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/125263 title OpenVPN 2.4.x < 2.4.6 Denial of Service Vulnerability (Windows) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2018-116-01.NASL description New openvpn packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue. last seen 2020-06-01 modified 2020-06-02 plugin id 109362 published 2018-04-27 reporter This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/109362 title Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / 14.2 / current : openvpn (SSA:2018-116-01) NASL family SuSE Local Security Checks NASL id OPENSUSE-2019-507.NASL description This update for openvpn fixes the following issues : - CVE-2018-9336: Fix potential double-free() in Interactive Service could lead to denial of service (bsc#1090839). This update was imported from the SUSE:SLE-15:Update update project. last seen 2020-06-01 modified 2020-06-02 plugin id 123212 published 2019-03-27 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/123212 title openSUSE Security Update : openvpn (openSUSE-2019-507) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-1888-1.NASL description This update for openvpn fixes the following issues : - CVE-2018-9336: Fix potential double-free() in Interactive Service could lead to denial of service (bsc#1090839). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-03-21 modified 2019-01-02 plugin id 120034 published 2019-01-02 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/120034 title SUSE SLED15 / SLES15 Security Update : openvpn (SUSE-SU-2018:1888-1)
References
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2018&m=slackware-security.568761
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2018&m=slackware-security.568761
- https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24
- https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24
- https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b
- https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b
- https://github.com/OpenVPN/openvpn/releases/tag/v2.4.6
- https://github.com/OpenVPN/openvpn/releases/tag/v2.4.6
- https://www.tenable.com/security/research/tra-2018-09
- https://www.tenable.com/security/research/tra-2018-09