vulnerability

Arch Linux: Information disclosure (CVE-2017-7520)

Severity
4
CVSS
(AV:N/AC:H/Au:N/C:P/I:N/A:P)
Published
Jun 27, 2017
Added
Jul 11, 2025
Modified
Nov 27, 2025

Description

A pre-authentication remote crash/information disclosure vulnerability has been discovered in OpenVPN < 2.4.3. If the client uses a HTTP proxy with NTLM authentication (i.e. "--http-proxy <server> <port> [<authfile>|'auto'|'auto-nct'] ntlm2") to connect to the OpenVPN server, an attacker in position of man-in-the-middle between the client and the proxy can cause the client to crash or disclose at most 96 bytes of stack memory. The disclosed stack memory is likely to contain the proxy password.

Solution

arch-linux-upgrade-latest
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.