CVE-2020-7224

Name
CVE-2020-7224
Description
The Aviatrix OpenVPN client through 2.5.7 on Linux, macOS, and Windows is vulnerable when OpenSSL parameters are altered from the issued value set; the parameters could allow unauthorized third-party libraries to load.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://docs.aviatrix.com/HowTos/security_bulletin_article.html
Vendor Advisory https://docs.aviatrix.com/#security-bulletin
Vendor Advisory https://docs.aviatrix.com/HowTos/security_bulletin_article.html#article-avxsb-00001

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:aviatrix:openvpn:*:*:*:*:*:*:*:* openvpn >= None <= 2.5.7

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
openvpn 3.11-main 2.4.11-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
openvpn 3.10-main 2.4.11-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
openvpn 3.15-main 2.5.6-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
openvpn 3.14-main 2.5.6-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
openvpn 3.13-main 2.5.6-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
openvpn 3.12-main 2.4.12-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
openvpn 3.16-main 2.5.6-r1 Natanael Copa <ncopa@alpinelinux.org> fixed