### [CVE-2016-6329](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6329) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack. ### POC #### Reference - https://sweet32.info/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Artem-Salnikov/devops-netology - https://github.com/Artem-Tvr/sysadmin-09-security - https://github.com/Justic-D/Dev_net_home_1 - https://github.com/Kapotov/3.9.1 - https://github.com/Vainoord/devops-netology - https://github.com/Valdem88/dev-17_ib-yakovlev_vs - https://github.com/Vladislav-Pugachev/netology-DevOps-dz_-14 - https://github.com/WiktorMysz/devops-netology - https://github.com/alexandrburyakov/Rep2 - https://github.com/alexgro1982/devops-netology - https://github.com/bysart/devops-netology - https://github.com/dmitrii1312/03-sysadmin-09 - https://github.com/geon071/netolofy_12 - https://github.com/ilya-starchikov/devops-netology - https://github.com/nikolay480/devops-netology - https://github.com/odolezal/D-Link-DIR-655 - https://github.com/pashicop/3.9_1 - https://github.com/stanmay77/security - https://github.com/vitaliivakhr/NETOLOGY - https://github.com/yellownine/netology-DevOps