vulnerability
Arch Linux: Information disclosure (CVE-2017-7520)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:H/Au:N/C:P/I:N/A:P) | Jun 27, 2017 | Jul 11, 2025 | Nov 27, 2025 |
Severity
4
CVSS
(AV:N/AC:H/Au:N/C:P/I:N/A:P)
Published
Jun 27, 2017
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
A pre-authentication remote crash/information disclosure vulnerability has been discovered in OpenVPN < 2.4.3. If the client uses a HTTP proxy with NTLM authentication (i.e. "--http-proxy <server> <port> [<authfile>|'auto'|'auto-nct'] ntlm2") to connect to the OpenVPN server, an attacker in position of man-in-the-middle between the client and the proxy can cause the client to crash or disclose at most 96 bytes of stack memory. The disclosed stack memory is likely to contain the proxy password.
Solution
arch-linux-upgrade-latest
References
- CVE-2017-7520
- https://attackerkb.com/topics/CVE-2017-7520
- URL-http://www.debian.org/security/2017/dsa-3900
- URL-http://www.securityfocus.com/bid/99230
- URL-http://www.securitytracker.com/id/1038768
- URL-https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
- URL-https://guidovranken.wordpress.com/2017/06/21/the-openvpn-post-audit-bug-bonanza/
- URL-https://security.archlinux.org/ASA-201706-27
- CWE-200
- CWE-125
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.