Bug 1188246 (CVE-2021-3547) - VUL-0: CVE-2021-3547: openvpn3: allows a man-in-the-middle attacker to bypass the certificate authentication
Summary: VUL-0: CVE-2021-3547: openvpn3: allows a man-in-the-middle attacker to bypass...
Status: RESOLVED FIXED
Alias: CVE-2021-3547
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/303852/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2021-07-13 09:35 UTC by Robert Frohl
Modified: 2024-05-31 13:16 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2021-07-13 09:35:39 UTC
CVE-2021-3547

OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker
to bypass the certificate authentication by issuing an unrelated server
certificate using the same hostname found in the verify-x509-name option in a
client configuration.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3547
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3547
https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements
https://community.openvpn.net/openvpn/wiki/CVE-2021-3547
Comment 1 Reinhard Max 2021-07-13 14:36:17 UTC
We don't ship OpenVPN 3 on any product, because so far it is just a client library and not a full replacement for OpenVPN 2.

https://github.com/OpenVPN/openvpn3
Comment 2 Andrea Mattiazzo 2024-05-31 13:16:52 UTC
All done, closing.