|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2017:1642-1)|
|Summary:||The remote host is missing an update for the 'openvpn' package(s) announced via the SUSE-SU-2017:1642-1 advisory.|
The remote host is missing an update for the 'openvpn' package(s) announced via the SUSE-SU-2017:1642-1 advisory.
This update for openvpn fixes the following issues:
- It was possible to trigger an assertion by sending a malformed IPv6
packet. That issue could have been abused to remotely shutdown an
openvpn server or client, if IPv6 and --mssfix were enabled and if the
IPv6 networks used inside the VPN were known. [bsc#1044947,
'openvpn' package(s) on SUSE Linux Enterprise Server 11-SP4, SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Debuginfo 11-SP3
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2017-7508|
BugTraq ID: 99230
Debian Security Information: DSA-3900 (Google Search)
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.