Jump to content

Security_Update_Urgent VPN Affected CVE-2019-14899

ucmRich

Hi all,

 

I don't know if this has been posted or not, search didn't find anythings but just in case here goes:

 

I just installed PIA version 1.7 and it mentioned that they patched the CVE-2019-14899 security bug.

 

Apparently it's a extremely bad bug; here is their site blog about it:

 

https://www.privateinternetaccess.com/blog/2019/12/private-internet-access-updates-linux-desktop-client-to-prevent-against-cve-2019-14899/

 

Here's a quote from PIA about affected platforms:

 

 

Quote

When the researchers tested the vulnerability on Linux, they found that most Linux distros were vulnerable. The vulnerability also affects IPv6. Confirmed affected systems include the following, though the list is in no way exhaustive:

  • Ubuntu 19.10 (systemd)
  • Fedora (systemd)
  • Debian 10.2 (systemd)
  • Arch 2019.05 (systemd)
  • Manjaro 18.1.1 (systemd)
  • MX Linux 19 (Mepis+antiX)
  • Deepin (rc.d)

 

 

 

The official bulletin can be found here:  https://nvd.nist.gov/vuln/detail/CVE-2019-14899

 

They say that in addition to various Linux distros; FreeBSD, OpenBSD, MacOS, iOS, and Android are affected as well so please patch as soon as you can.

 

Stay safe everyone!

 

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Quote

A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream.

Well then, this is pretty much a MITM attack. Pretty bad.

Current LTT F@H Rank: 90    Score: 2,503,680,659    Stats

Yes, I have 9 monitors.

My main PC (Hybrid Windows 10/Arch Linux):

OS: Arch Linux w/ XFCE DE (VFIO-Patched Kernel) as host OS, windows 10 as guest

CPU: Ryzen 9 3900X w/PBO on (6c 12t for host, 6c 12t for guest)

Cooler: Noctua NH-D15

Mobo: Asus X470-F Gaming

RAM: 32GB G-Skill Ripjaws V @ 3200MHz (12GB for host, 20GB for guest)

GPU: Guest: EVGA RTX 3070 FTW3 ULTRA Host: 2x Radeon HD 8470

PSU: EVGA G2 650W

SSDs: Guest: Samsung 850 evo 120 GB, Samsung 860 evo 1TB Host: Samsung 970 evo 500GB NVME

HDD: Guest: WD Caviar Blue 1 TB

Case: Fractal Design Define R5 Black w/ Tempered Glass Side Panel Upgrade

Other: White LED strip to illuminate the interior. Extra fractal intake fan for positive pressure.

 

unRAID server (Plex, Windows 10 VM, NAS, Duplicati, game servers):

OS: unRAID 6.11.2

CPU: Ryzen R7 2700x @ Stock

Cooler: Noctua NH-U9S

Mobo: Asus Prime X470-Pro

RAM: 16GB G-Skill Ripjaws V + 16GB Hyperx Fury Black @ stock

GPU: EVGA GTX 1080 FTW2

PSU: EVGA G3 850W

SSD: Samsung 970 evo NVME 250GB, Samsung 860 evo SATA 1TB 

HDDs: 4x HGST Dekstar NAS 4TB @ 7200RPM (3 data, 1 parity)

Case: Sillverstone GD08B

Other: Added 3x Noctua NF-F12 intake, 2x Noctua NF-A8 exhaust, Inatek 5 port USB 3.0 expansion card with usb 3.0 front panel header

Details: 12GB ram, GTX 1080, USB card passed through to windows 10 VM. VM's OS drive is the SATA SSD. Rest of resources are for Plex, Duplicati, Spaghettidetective, Nextcloud, and game servers.

Link to comment
Share on other sites

Link to post
Share on other sites

NVD data on CVE-2019-14899:

 

https://nvd.nist.gov/vuln/detail/CVE-2019-14899

 

This was originally reported on by media on December 6th:

https://www.bleepingcomputer.com/news/security/new-linux-vulnerability-lets-attackers-hijack-vpn-connections/

 

OpenVPN says:

Quote

No flaws found in OpenVPN software. Our response to the CVE-2019-14899 vulnerability report.

SECURITY ADVISORY

OUR RESPONSE TO THE CVE-2019-14899 VULNERABILITY REPORT

A research team from the University of New Mexico discovered a vulnerability currently being tracked as CVE-2019-14899 which claims that VPN connections can be hijacked on Linux and Unix systems. The report mentioned the OpenVPN protocol. As part of good security principles, we are looking into this and any possible attack vectors, however we have found no flaws in the OpenVPN software.

An initial investigation by our security experts, and experts across the globe, reveals that this issue affects all network interfaces, not VPN in particular.

“It doesn't appear to be a flaw in the OpenVPN software, but a flaw in the configuration of the operating system itself. The issue is more in how the operating system deals with this type of attack in general, rather than anything going wrong in the VPN connection itself,” says OpenVPN Access Server Product Manager, Johan Draaisma.

To our knowledge, the vulnerability is only impacting Linux and Unix systems and requires that the attacker has control over your Internet access point and can therefore reach and affect your computer outside of the VPN, in the local network, for example. Based on this, the attack is somewhat limited, and there is no straight-forward way to retrieve unencrypted data from the VPN connection.

“The issue may actually be located in the Linux operating system settings rather than in our software, but given the serious nature of the attack, we are paying close attention and will consider whatever steps are appropriate to ensure OpenVPN remains safe to use on these affected platforms. For now enabling the ‘reverse path filter’ setting in the OS is a good first step to help protect against this attack,” says Draaisma.

https://openvpn.net/security-advisory/no-flaws-found-in-openvpn-software/

 

Link to comment
Share on other sites

Link to post
Share on other sites

I am now glad that I moved my Android client over to proton VPN now.

 

For anyone that doesn't know, you can create a Protonmail account, and then use the free servers at ProtonVPN, it doesn't come with advanced features, they are behind a paywall, but it does come with as standard.

Quote
  • 1 simultaneous VPN connection
  • Servers in 3 countries
  • Medium speed
  • No logs policy
  • No data limit
  • No ads

 

If you need it on more than 1 client, you could make several accounts for example... or get their paid versions for features such as

 

firefox_m8ne27liIe.thumb.png.a3319dedb28885b2fb51f3ddea4e9d65.png

 

https://protonvpn.com/

 

 

Hope this helps someone. I am not associated with them in any way, just want to spread the word about this awesome company.

I have been using Protonmail for years with 2FA, everything encrypted etc.

 

Just for transparency, you may not find a close free server in your location. But for me, living in the UK, I have free servers come up in:

  • Netherlands
  • USA
  • Japan

All other countries, and regions of countries are behind the paywall. I personally advise that the paid versions have some great features, but if all you need is one connection on one device and you have a free server near to you, then go for free.

Please quote my post, or put @paddy-stone if you want me to respond to you.

Spoiler
  • PCs:- 
  • Main PC build  https://uk.pcpartpicker.com/list/2K6Q7X
  • ASUS x53e  - i7 2670QM / Sony BD writer x8 / Win 10, Elemetary OS, Ubuntu/ Samsung 830 SSD
  • Lenovo G50 - 8Gb RAM - Samsung 860 Evo 250GB SSD - DVD writer
  •  
  • Displays:-
  • Philips 55 OLED 754 model
  • Panasonic 55" 4k TV
  • LG 29" Ultrawide
  • Philips 24" 1080p monitor as backup
  •  
  • Storage/NAS/Servers:-
  • ESXI/test build  https://uk.pcpartpicker.com/list/4wyR9G
  • Main Server https://uk.pcpartpicker.com/list/3Qftyk
  • Backup server - HP Proliant Gen 8 4 bay NAS running FreeNAS ZFS striped 3x3TiB WD reds
  • HP ProLiant G6 Server SE316M1 Twin Hex Core Intel Xeon E5645 2.40GHz 48GB RAM
  •  
  • Gaming/Tablets etc:-
  • Xbox One S 500GB + 2TB HDD
  • PS4
  • Nvidia Shield TV
  • Xiaomi/Pocafone F2 pro 8GB/256GB
  • Xiaomi Redmi Note 4

 

  • Unused Hardware currently :-
  • 4670K MSI mobo 16GB ram
  • i7 6700K  b250 mobo
  • Zotac GTX 1060 6GB Amp! edition
  • Zotac GTX 1050 mini

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

On 12/12/2019 at 12:38 PM, OlympicAssEater said:

You should dump pia because the company got acquired by another shady company. 

Normally I would drop them like you all have but Linus and crew have been trying to get PIA to come on the show to discuss the situation and try to instill proper trust; not to mention I already paid them for 2 years just a few months ago so they wont be giving back my $ -_-

 

Originally I was going to go with tunnelbear but the same day i was going to go with them is when they got snatched up and i decided to wait till another vpn could be considered.

 

I didn't go with nordvpn because a friend said not to and he turned out to be right.

 

I am very hopeful that PIA would pull thru the trust barrier whenever they can get on the show with Linus.  I'm going to miss the show today again though, darn real life *shakes fist*

 

May the vpn gods be with us <.<

 

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×